<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-8494849674688759807</atom:id><lastBuildDate>Fri, 27 Mar 2026 10:35:46 +0000</lastBuildDate><category>Security</category><category>Hacking</category><category>Windows</category><category>Security Tools</category><category>Windows Xp</category><category>Email</category><category>Tutorial</category><category>Password</category><category>Tools</category><category>Administrator</category><category>Hardcore Hacking</category><category>Keyloggers</category><category>RATS</category><category>Password Hacking</category><category>Penetration Testing</category><category>Backtrack</category><category>Exploit</category><category>Web Hacking</category><category>Linux</category><category>Phishing</category><category>Privacy</category><category>Vulnerability</category><category>Facebook</category><category>Session Hijacking</category><category>Usb</category><category>Virus</category><category>Cookie</category><category>Firesheep</category><category>IpAddress</category><category>Port scanning</category><category>Registry</category><category>Session</category><category>Website Hacking</category><category>Ethical Hacking</category><category>Forensic</category><category>Google</category><category>Log</category><category>Shellcode</category><category>Sidejacking</category><category>Twitter</category><category>Anti-Forensic</category><category>AntiVirus</category><category>Blacksheep</category><category>Download</category><category>HoneyPot</category><category>Network Security</category><category>Orkut</category><category>Proxy</category><category>Recovery</category><category>Security Sites</category><category>Shell</category><category>Spam</category><category>Sql Injection</category><category>Authentication</category><category>Binder</category><category>Bypass</category><category>Computer Threats</category><category>Cyber Laws</category><category>Dork</category><category>Encryption</category><category>Firewall</category><category>Hacking Books</category><category>Hacking Campaign_India</category><category>Hacking Sites</category><category>Http Tunneling</category><category>Intrusion Detection</category><category>Metasploit</category><category>Online Banking</category><category>Payload</category><category>Presentation</category><category>Remote File Inclusion</category><category>Rooting</category><category>SAM</category><category>Sniffing</category><category>Social Media</category><category>Tabnabbing</category><category>Tricks</category><category>Tunnel</category><category>Virtual Box</category><category>Virtual Environment</category><category>Wireless Hacking</category><category>XSS</category><category>spoofing</category><category>Android</category><category>Autorun</category><category>Booting</category><category>Browser</category><category>Captcha</category><category>Comment</category><category>DKIM</category><category>DNS</category><category>Deface</category><category>Fast-track</category><category>Gingerbread</category><category>Hash</category><category>Header</category><category>Infographics</category><category>Link Exchange</category><category>MacAddress</category><category>Malware</category><category>Mobile Hacking</category><category>Online scanner</category><category>Operating System</category><category>Packets</category><category>Portable</category><category>ROM</category><category>Scanner</category><category>Server</category><category>Sniffer</category><category>Syskey</category><category>TXT</category><category>Two-way Authentication</category><category>VPN</category><category>Worm</category><category>blogger</category><category>ramnit</category><category>wordpress</category><title>SecurityHunk</title><description></description><link>https://www.securityhunk.in/</link><managingEditor>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</managingEditor><generator>Blogger</generator><openSearch:totalResults>76</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8494849674688759807.post-7797978092503647931</guid><pubDate>Sun, 27 Oct 2019 21:13:00 +0000</pubDate><atom:updated>2019-10-29T18:12:24.097+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Backtrack</category><category domain="http://www.blogger.com/atom/ns#">Email</category><category domain="http://www.blogger.com/atom/ns#">Encryption</category><category domain="http://www.blogger.com/atom/ns#">Forensic</category><category domain="http://www.blogger.com/atom/ns#">Hacking Campaign_India</category><category domain="http://www.blogger.com/atom/ns#">Hardcore Hacking</category><category domain="http://www.blogger.com/atom/ns#">IpAddress</category><category domain="http://www.blogger.com/atom/ns#">Privacy</category><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Spam</category><title>What is Email Header ? View email header in Gmail.</title><atom:summary type="text">
Many people open there inbox in-order to check their email or send a email and  then sign-out but what we do not know that there are indeed lot of things are carried out when we  simply send or receive a email.

There is a detail report/history of all  those things&amp;nbsp; that are carried out and are attached with the email.

Yes, I am  talking about email headers.They are kept hidden from normal</atom:summary><link>https://www.securityhunk.in/2019/10/what-is-an-Email-Header.html</link><author>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyxRHZDY9CcysipE5-qtJHczchg0VXb2kx8W8VvXcYMpKNeLph33YFTWbNxLanfyoUPH7dINb1i5RydCbB0JIgqSolOvITXagQ4OWC3e4h23wHZwT3ZqJ-8igoq5GD9kqyxExs8QsN7Vw/s72-c/Email.jpg" height="72" width="72"/><thr:total>10</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8494849674688759807.post-4926773802855549884</guid><pubDate>Wed, 23 Oct 2019 20:00:00 +0000</pubDate><atom:updated>2019-10-24T16:57:39.193+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Administrator</category><category domain="http://www.blogger.com/atom/ns#">AntiVirus</category><category domain="http://www.blogger.com/atom/ns#">Computer Threats</category><category domain="http://www.blogger.com/atom/ns#">Cyber Laws</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Hacking Sites</category><category domain="http://www.blogger.com/atom/ns#">Security Sites</category><category domain="http://www.blogger.com/atom/ns#">Session Hijacking</category><category domain="http://www.blogger.com/atom/ns#">Shellcode</category><category domain="http://www.blogger.com/atom/ns#">Sidejacking</category><category domain="http://www.blogger.com/atom/ns#">Social Media</category><category domain="http://www.blogger.com/atom/ns#">spoofing</category><category domain="http://www.blogger.com/atom/ns#">Vulnerability</category><category domain="http://www.blogger.com/atom/ns#">Web Hacking</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>10 Steps to take after Cyber Security Breach 2019</title><atom:summary type="text">
While a major part of preventing all massive potential data intrusion damage or cyber security breaches lies in the preventative measures of secure code, updated security software, use of frequently updated applications and strong passwords for all access points to your data; sometimes cyber security breaches happen no matter how well you have protected yourself. When this happens, prevention no</atom:summary><link>https://www.securityhunk.in/2019/10/10-steps-after-cyber-security-breach.html</link><author>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj78q0_Aj300co5ZDbNdvSBWdEqk9hOT1xNuchmPbHrsITAAWaNqreR_22quB9y6-vDoKE5KW0-XgdgCp0_q0ccPZt_3dKB2TMiDrglJuDopNZ5XnC0cXlNBxfk7s_1gGuipLPAqhl5J6I/s72-c/top10_securityhunk.jpg" height="72" width="72"/><thr:total>5</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8494849674688759807.post-2522487185137685084</guid><pubDate>Fri, 20 Jan 2012 14:52:00 +0000</pubDate><atom:updated>2018-09-29T10:36:47.493+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Administrator</category><category domain="http://www.blogger.com/atom/ns#">Authentication</category><category domain="http://www.blogger.com/atom/ns#">Bypass</category><category domain="http://www.blogger.com/atom/ns#">Ethical Hacking</category><category domain="http://www.blogger.com/atom/ns#">Facebook</category><category domain="http://www.blogger.com/atom/ns#">Hardcore Hacking</category><category domain="http://www.blogger.com/atom/ns#">Malware</category><category domain="http://www.blogger.com/atom/ns#">Password</category><category domain="http://www.blogger.com/atom/ns#">Password Hacking</category><category domain="http://www.blogger.com/atom/ns#">Payload</category><category domain="http://www.blogger.com/atom/ns#">ramnit</category><category domain="http://www.blogger.com/atom/ns#">Rooting</category><category domain="http://www.blogger.com/atom/ns#">Social Media</category><category domain="http://www.blogger.com/atom/ns#">Windows Xp</category><category domain="http://www.blogger.com/atom/ns#">Worm</category><title>Ramnit : Worm that loves Facebook</title><atom:summary type="text">


&amp;nbsp;&quot;Ramnit&quot;&amp;nbsp; the worm with multifaceted spreading capabilities,first detected on 2010 for infecting local systems. Now the hackers behind it have redesigned it into a more advanced kind of worm.The worm has already stolen 45000 facebook credentials and still on move.







It is also confirmed that this worm is able to bypass the two level authentication used by banking organizations </atom:summary><link>https://www.securityhunk.in/2012/01/ramnit-worm-that-loves-facebook.html</link><author>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaTtn2LfSs93QV5EHsiQB7BlkexzfooiyAzDyvdwMi5K18ke1nyWu9bNsdLe8q0tSqpmqmGVjjSxjlhzcDbXdAKycRQ9lJqh7XA_NhiH6vjL4WSMuv9h0PKvkAd9BhebRbAV0qF5cXqww/s72-c/Securityhunk_ramnit_facebook.jpg" height="72" width="72"/><thr:total>29</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8494849674688759807.post-7231722730548557881</guid><pubDate>Fri, 21 Oct 2011 20:19:00 +0000</pubDate><atom:updated>2019-10-28T17:55:12.434+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Android</category><category domain="http://www.blogger.com/atom/ns#">Booting</category><category domain="http://www.blogger.com/atom/ns#">Exploit</category><category domain="http://www.blogger.com/atom/ns#">Gingerbread</category><category domain="http://www.blogger.com/atom/ns#">Hardcore Hacking</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><category domain="http://www.blogger.com/atom/ns#">Mobile Hacking</category><category domain="http://www.blogger.com/atom/ns#">Operating System</category><category domain="http://www.blogger.com/atom/ns#">Recovery</category><category domain="http://www.blogger.com/atom/ns#">ROM</category><category domain="http://www.blogger.com/atom/ns#">Rooting</category><category domain="http://www.blogger.com/atom/ns#">Tools</category><category domain="http://www.blogger.com/atom/ns#">Tutorial</category><title>A  Beginner&#39;s Guide to Android Rooting | Easy Reference</title><atom:summary type="text">
Android in the one of the widely accepted OS in devices(phones,Tabs etc) these days because of its largely managed apps and control it give to its users.Where is honey so bears are there......


I mean because of its popularity it is one of the hotspot for attacker these days.So,I thought of sharing few security tips with my readers,for that the apps we need to work with will be functional on </atom:summary><link>https://www.securityhunk.in/2011/10/beginners-guide-to-android-rooting-easy.html</link><author>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2Q8b00i9f4WEVeEcbXqQxNQ9oTwpid2hmE-oiC-_1WYzcQtpZy6iVg2o6B9wbXQNj8j7duak-hpqAVz3UEi4btfdIcnTFBTRyI7Jchc9HyEDNmcERPyGVo_YZxPLYe28gzM1QLX-uWqA/s72-c/SecurityHunk_Android_Rooting.jpg" height="72" width="72"/><thr:total>42</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8494849674688759807.post-8802030382825973368</guid><pubDate>Sun, 16 Oct 2011 09:41:00 +0000</pubDate><atom:updated>2018-09-25T12:40:43.454+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Ethical Hacking</category><category domain="http://www.blogger.com/atom/ns#">Exploit</category><category domain="http://www.blogger.com/atom/ns#">Hardcore Hacking</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><category domain="http://www.blogger.com/atom/ns#">Network Security</category><category domain="http://www.blogger.com/atom/ns#">Security Tools</category><category domain="http://www.blogger.com/atom/ns#">Tools</category><title>Yersinia | Analyze and Test  Deployed  Networks</title><atom:summary type="text">
&quot;Yersinia&quot; a type of bacteria but here in context to this site it is&amp;nbsp; a&amp;nbsp; Network tool designed to analyze,test and monitor&amp;nbsp; the weakness in different network protocols listed with it.

Attack on the following Network Protocol are possible as listed below.




Recently Cisco VTP Dos exploit&amp;nbsp; included in the latest version:0.7.1




Home Page : http://www.yersinia.net
</atom:summary><link>https://www.securityhunk.in/2011/10/yersina-analyze-and-test-deployed.html</link><author>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMGOha5pqOmFJG0qgvH7qT1-LKDXvpIyDkfoRSpHtHgGuYq-NSGLNpC5lstAuPafVsoeCQ996qwn_PGoD0VTTLHqf0k7uvLjDSMshn6c5Yia6DNqqHBSIjZvZl7N9pDcUtOlE653fKwG4/s72-c/SecurityHunk_Yersinia1.jpg" height="72" width="72"/><thr:total>7</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8494849674688759807.post-4854909052785134286</guid><pubDate>Wed, 21 Sep 2011 16:47:00 +0000</pubDate><atom:updated>2018-09-25T13:37:51.504+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Ethical Hacking</category><category domain="http://www.blogger.com/atom/ns#">Exploit</category><category domain="http://www.blogger.com/atom/ns#">Firewall</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Hardcore Hacking</category><category domain="http://www.blogger.com/atom/ns#">Penetration Testing</category><category domain="http://www.blogger.com/atom/ns#">Port scanning</category><category domain="http://www.blogger.com/atom/ns#">Remote File Inclusion</category><category domain="http://www.blogger.com/atom/ns#">Security Tools</category><category domain="http://www.blogger.com/atom/ns#">Shell</category><category domain="http://www.blogger.com/atom/ns#">Shellcode</category><category domain="http://www.blogger.com/atom/ns#">Tools</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><category domain="http://www.blogger.com/atom/ns#">Windows Xp</category><title>winAUTOPWN V2.7  | Windows Interactive exploit  framework Tool</title><atom:summary type="text">

winAUTOPWN is a simple tool which works on windows platform and is quick in systems vulnerability exploitation.This is tool which takes less information from your side and does more effective work.





Why you should use this tool?

1. It takes simple inputs like IpAddress,Hostname,CMS Path

2. It also does a smart multi-threaded port scan (1 to 65535).

3. Exploits written by other writers </atom:summary><link>https://www.securityhunk.in/2011/09/winautopwn-v27-windows-interactive.html</link><author>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4ICdAy7q7D0apupXlVm-MMnK7MSbRjX8LTX1pUcf-G9kRBmHhgml30AV27HmPPgrVq0wNcR1YeMueNlzcdwyGb1GmACZVDQEVYn1s8HmliAOTwR6oypiD44f_EemgORIijQF7DX-U4BI/s72-c/cats.jpg" height="72" width="72"/><thr:total>7</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8494849674688759807.post-884590548774296263</guid><pubDate>Wed, 09 Feb 2011 06:37:00 +0000</pubDate><atom:updated>2018-09-25T13:50:43.321+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Backtrack</category><category domain="http://www.blogger.com/atom/ns#">Download</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><category domain="http://www.blogger.com/atom/ns#">Password Hacking</category><category domain="http://www.blogger.com/atom/ns#">Penetration Testing</category><category domain="http://www.blogger.com/atom/ns#">Portable</category><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Security Tools</category><category domain="http://www.blogger.com/atom/ns#">Tools</category><category domain="http://www.blogger.com/atom/ns#">Usb</category><title>Katana | A portable multi-boot security suite</title><atom:summary type="text">

Katana a tool which holds over 100 applications under it which can be run a USB/flash drive.As the new v2 has come up with a major addition called &quot;Forge&quot;,which helps in further addition of new applications to the booting list.



&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;Learn how to use portable applicaions from your PC.

Portable Applications:

1.BackTrack
2.Computer Aided Investigative Environment(CAINE)
3.</atom:summary><link>https://www.securityhunk.in/2011/02/katana-portable-multi-boot-security.html</link><author>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXkPfanY1kmT6kth_rKDXhlYi1Odo2zZ2zVKS6b2vDNgpi0A0Dj8KY31PXxAPpfGtAXS3uwp3zSnRU0ixXcBrhfPImDQA2PuJfgxg-ywkxAboLwmZnEX1vBz2pL2d_mi-D0KSxgp5-z2w/s72-c/katana_securityhunk.jpg" height="72" width="72"/><thr:total>49</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8494849674688759807.post-5762044603072793403</guid><pubDate>Wed, 02 Feb 2011 15:24:00 +0000</pubDate><atom:updated>2019-10-28T17:55:12.420+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cookie</category><category domain="http://www.blogger.com/atom/ns#">Firesheep</category><category domain="http://www.blogger.com/atom/ns#">Network Security</category><category domain="http://www.blogger.com/atom/ns#">Password Hacking</category><category domain="http://www.blogger.com/atom/ns#">Privacy</category><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Security Tools</category><category domain="http://www.blogger.com/atom/ns#">Session</category><category domain="http://www.blogger.com/atom/ns#">Session Hijacking</category><category domain="http://www.blogger.com/atom/ns#">Sniffing</category><category domain="http://www.blogger.com/atom/ns#">Tools</category><category domain="http://www.blogger.com/atom/ns#">Tutorial</category><title>More Security for Firesheep from Mozilla | HSTS</title><atom:summary type="text">

Firesheep was a buzz word few months ago then came the blacksheep to counter protect users from it.

The firesheep tutorial I demonstrated in a post shows how an attacker can gain access to any account(Twitter,Facebook,Gmail etc) with out even knowing the password using Sidejacking.




Now with the increase of threats from the tools like Firesheep Mozilla has come with a concept of &quot;HTTP </atom:summary><link>https://www.securityhunk.in/2011/02/more-security-for-firesheep-from.html</link><author>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHQmkDF1Fki1alPE7_XEUfUOMtnPJUBJd1b5vxtEQDXGJ8saGd6o-70aaoHN6JSHIVH-SwkGER6fmDmjEVCyj2cZ2V5CglnJE-Q41YCUCbOqUXUEMu0blkGK3O0KBqq9o9Upm886TYjJI/s72-c/HTTP+Strict-Transport-Security.jpg" height="72" width="72"/><thr:total>18</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8494849674688759807.post-5594966694939608644</guid><pubDate>Mon, 31 Jan 2011 11:02:00 +0000</pubDate><atom:updated>2011-01-31T18:41:49.284+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Ethical Hacking</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Hardcore Hacking</category><category domain="http://www.blogger.com/atom/ns#">Penetration Testing</category><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Shell</category><category domain="http://www.blogger.com/atom/ns#">Shellcode</category><category domain="http://www.blogger.com/atom/ns#">Tools</category><title>New Inguma |A free Penetration and Vulnerability Research Toolkit</title><atom:summary type="text">Inguma is a free penetration and vulnerability research tool kit written in python, recently the new version has been released after 3 years and with a very user friendly Graphical user interface.

1.Learn more about it here.

2.Visit there blog for more updates.

Download Inguma 0.2 :

1.Inguma-0.2.tar.gz

2.You can use it with Backtrack as it comes with it under Pentesting tools.</atom:summary><link>https://www.securityhunk.in/2011/01/new-inguma-free-penetration-and.html</link><author>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBGQuDY_cCdVVhOeIj3zl6zJJU5EtD10qfVze2-_ZLFQLXBnf3-rwo2MOhiJ_23I_yQPICb0FLnM0BfQXCTmds-z3lpH4RwtwAPhRCdrx2HebV1s-IjnicUQIsjTROgAlC-aHoBeTu040/s72-c/Inguma_securityhunk.jpg" height="72" width="72"/><thr:total>7</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8494849674688759807.post-6736250807304289493</guid><pubDate>Sat, 29 Jan 2011 10:50:00 +0000</pubDate><atom:updated>2011-01-29T16:30:17.877+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Computer Threats</category><category domain="http://www.blogger.com/atom/ns#">Infographics</category><category domain="http://www.blogger.com/atom/ns#">Security</category><title>Computer Security  Threats | Infographics</title><atom:summary type="text">


Source:http://www.onlineschools.org/blog/computer-threats


This is a Guest Post by Suresh Peters a Computer Science student from Chennai,India.
He is a cool person and a part time blogger at Softwarebuzzer,you can catch him here.</atom:summary><link>https://www.securityhunk.in/2011/01/computer-security-threats-infographics.html</link><author>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</author><thr:total>8</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8494849674688759807.post-5458065474427060627</guid><pubDate>Fri, 28 Jan 2011 15:24:00 +0000</pubDate><atom:updated>2019-10-28T17:55:12.382+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Backtrack</category><category domain="http://www.blogger.com/atom/ns#">Exploit</category><category domain="http://www.blogger.com/atom/ns#">Fast-track</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Hardcore Hacking</category><category domain="http://www.blogger.com/atom/ns#">Metasploit</category><category domain="http://www.blogger.com/atom/ns#">Payload</category><category domain="http://www.blogger.com/atom/ns#">Penetration Testing</category><category domain="http://www.blogger.com/atom/ns#">Shellcode</category><category domain="http://www.blogger.com/atom/ns#">Tools</category><category domain="http://www.blogger.com/atom/ns#">Tutorial</category><title>Fast-Track Tutorial for Beginners | Payload Generation</title><atom:summary type="text">
We discussed Metasploit framework in a post and today in this tutorial we will be discussing about Fast-Track which is very easy to use as compared to metasploit as we will see later in the discussion.Here we will discuss how to generate payload using Fast-track from its menu driven interface.



What is Fast-Track?
&amp;nbsp;It is an open-source project in python and brain child of David Kennedy to</atom:summary><link>https://www.securityhunk.in/2011/01/fast-track-tutorial-for-beginners.html</link><author>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKeInEvm4HbfqrR4_A-pvAZbWK2bM4JgbIPJfvvFTiim2OtRK3uDphVnTt_UpLwIA02Z5BbujrWk-awVBicXVYe950KUI6HiIETfYw9ql8zerlXqUl2f_NBuIHKehT9KGtfxcf6TEjSVA/s72-c/fastrack_securityhunk.jpg" height="72" width="72"/><thr:total>25</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8494849674688759807.post-5712009559886278329</guid><pubDate>Mon, 17 Jan 2011 08:44:00 +0000</pubDate><atom:updated>2019-10-28T17:55:12.395+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Dork</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Password Hacking</category><category domain="http://www.blogger.com/atom/ns#">Sql Injection</category><category domain="http://www.blogger.com/atom/ns#">Tutorial</category><category domain="http://www.blogger.com/atom/ns#">Web Hacking</category><category domain="http://www.blogger.com/atom/ns#">Website Hacking</category><title>Sql Injection | Basic and Detail Tutorial.</title><atom:summary type="text">
What is SQL injection ?

SQL(Structured Query Language) injection or insertion is an attack technique that exploits the vulnerability of the web application that communicates with the database of the server.This type of attack is successful if the application fails to validate the user supplied inputs in sql statements to communicate with the database there by allowing the attacker to gain </atom:summary><link>https://www.securityhunk.in/2011/01/sql-injection-basic-and-detail-tutorial.html</link><author>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgP0U3nSAe9V4kdN9UA1eLpl4pZE-oDMoZy15u0TOjH82BFgJPfJaCt-6SF4jhS1N98zN_s0umLh8q144ZIMB-1oPCN391ZLecHvLJzg_FWg_khNHtsts3BcF86aKtsNRlOvdwD8rbVtRY/s72-c/sqlinjection_securityhunk.jpg" height="72" width="72"/><thr:total>12</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8494849674688759807.post-5960913789239319393</guid><pubDate>Thu, 13 Jan 2011 18:34:00 +0000</pubDate><atom:updated>2019-10-24T17:50:05.420+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Administrator</category><category domain="http://www.blogger.com/atom/ns#">Bypass</category><category domain="http://www.blogger.com/atom/ns#">Firewall</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Http Tunneling</category><category domain="http://www.blogger.com/atom/ns#">Network Security</category><category domain="http://www.blogger.com/atom/ns#">Proxy</category><category domain="http://www.blogger.com/atom/ns#">Server</category><category domain="http://www.blogger.com/atom/ns#">Tunnel</category><title>What is Http Tunneling | Bypass firewall and proxy</title><atom:summary type="text">
In most of the institutions and companies due to security risk many restrictions are being imposed on network like blocked ports etc.There are many ports that are blocked for outbound connection and few ports for http connection are opened so that people working over there can access there email etc.As the http port outbound is opened so it can be used for http tunnel to access restricted </atom:summary><link>https://www.securityhunk.in/2011/01/http-tunneling-bypass-firewall-and.html</link><author>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9S5oWMwpNpkqb5Iqx5uF2cKNDcDQCemaHxaxAcDEI-AXAkKNJFhYTstqmQRrcfFGrMk9kKYx2GyvoccgjuXJeb9HQY_nmGsQ_SsUENZdLhxlKmqSNZiyCBeCXJIFIi8Hg3dMesunTP5Y/s72-c/httptunnel3.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8494849674688759807.post-6449286244670719603</guid><pubDate>Mon, 10 Jan 2011 15:25:00 +0000</pubDate><atom:updated>2011-01-10T20:55:51.105+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Administrator</category><category domain="http://www.blogger.com/atom/ns#">Authentication</category><category domain="http://www.blogger.com/atom/ns#">DKIM</category><category domain="http://www.blogger.com/atom/ns#">DNS</category><category domain="http://www.blogger.com/atom/ns#">Email</category><category domain="http://www.blogger.com/atom/ns#">Header</category><category domain="http://www.blogger.com/atom/ns#">Spam</category><category domain="http://www.blogger.com/atom/ns#">TXT</category><title>Reduce spam by using DKIM authentication in Google Apps</title><atom:summary type="text">Spam is a common word these days as our mailbox is flooded with these stuffs every day.Spammers use these trick to promote their product and sometimes compromise an account.Gmail is using the DKIM authentication in the email header to authenticate a mail from a real sender.Now the google has again come up with a new step to fight against the spam by introducing DKIM authentication for its google </atom:summary><link>https://www.securityhunk.in/2011/01/reduce-spam-by-using-dkim.html</link><author>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8MZI_uQoi5zIs-d0m7ika85CxiN3PX4T_jzcxM2w9xE5AbeqiGrcbqPIu-EF6ui3S5FZl6_ZEF4l5RGDyiHmxuI_89uB3pBjhpJcQvaGil22rsIBG9x1dfM27N0NZ5ztKTkbA5BVIbVQ/s72-c/spam-securityhunk.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8494849674688759807.post-8840075248156525582</guid><pubDate>Thu, 06 Jan 2011 09:44:00 +0000</pubDate><atom:updated>2011-01-06T15:14:01.639+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Browser</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Online scanner</category><category domain="http://www.blogger.com/atom/ns#">Port scanning</category><category domain="http://www.blogger.com/atom/ns#">Scanner</category><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Security Sites</category><category domain="http://www.blogger.com/atom/ns#">Security Tools</category><category domain="http://www.blogger.com/atom/ns#">Virus</category><category domain="http://www.blogger.com/atom/ns#">Vulnerability</category><title>Few Online Tools  for Computer  and Online Security</title><atom:summary type="text">Computer security is of foremost importance these days even more than our physical security..lol.There are few online tools available through which we ensure our security to certain extent.We cannot say our PC will be 100% secure but to some extent we will be benefited&amp;nbsp; for sure.
File scanner:
1.Kaspersky:
It can used to scan files upto size 1mb and archieve file(zip,arj format etc) upto </atom:summary><link>https://www.securityhunk.in/2011/01/few-online-tools-for-computer-and.html</link><author>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTrc07YygnDGW0CX-Qj9AJG9YPlOUxhQNKuUT1K-RLvk8vwAR1Lp5sw5nBfJdZOQpgXz2_DAmvuYIcDWWsEMrSUo-2rTJR4UKab1246Tgunk67fK9nfmr9eQZhb0LGp4kPTy77vJk6zew/s72-c/Online+security.jpg" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8494849674688759807.post-1852942928401701121</guid><pubDate>Wed, 05 Jan 2011 09:31:00 +0000</pubDate><atom:updated>2018-09-21T07:17:02.784+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">MacAddress</category><category domain="http://www.blogger.com/atom/ns#">Privacy</category><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Security Tools</category><category domain="http://www.blogger.com/atom/ns#">spoofing</category><category domain="http://www.blogger.com/atom/ns#">Tools</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><category domain="http://www.blogger.com/atom/ns#">Windows Xp</category><category domain="http://www.blogger.com/atom/ns#">Wireless Hacking</category><title>How to change Mac Address manually and spoof  using tool.</title><atom:summary type="text">
Computers talk or communicate over the network using Mac address(Media Access Control Address ) which is unique for each and every machine.Here in this post we will see how we can spoof or change the Mac Address manually and using tools.





Procedure:


Using Registry:

Step 1.
Type &quot;Regedit&quot; in run and press enter.In the regedit winodow follow the path
[HKEY_LOCAL_MACHINE\SYSTEM\</atom:summary><link>https://www.securityhunk.in/2011/01/how-to-change-mac-address-manually-and.html</link><author>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJn5rXyVZGsqp7dfu5twK9c0bTT7Z0PT9GJjgvZciq4UZqEszOYQnjIKktdCTghjsUrN5I8CVxSGGtIBJwRp8gDvHfn4NzIxD2Wde0of7RRjcJif7ElcVxQ0ApWNaFeiUYKPRsrltmtro/s72-c/Mac_spoof.gif" height="72" width="72"/><thr:total>5</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8494849674688759807.post-2907030811875569517</guid><pubDate>Mon, 03 Jan 2011 14:13:00 +0000</pubDate><atom:updated>2011-01-03T19:43:22.948+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Blacksheep</category><category domain="http://www.blogger.com/atom/ns#">Facebook</category><category domain="http://www.blogger.com/atom/ns#">Firesheep</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Password</category><category domain="http://www.blogger.com/atom/ns#">Password Hacking</category><category domain="http://www.blogger.com/atom/ns#">Privacy</category><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Session</category><category domain="http://www.blogger.com/atom/ns#">Session Hijacking</category><category domain="http://www.blogger.com/atom/ns#">Sidejacking</category><title>Monitor Facebook activity and increase Security</title><atom:summary type="text">Facebook is one of the most widely used social networking site these days.So,if your account get compromised in any way for example by session hijacking etc then it may result in a big headache.Here in this post i will tell you how you can monitor your account activity details like location,OS type and time of access.

Read the&amp;nbsp; post on &quot;Facebook security and privacy tips&quot;.

Procedure:

Step</atom:summary><link>https://www.securityhunk.in/2011/01/monitor-facebook-activity-and-increase.html</link><author>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgT5E0MYzB2kMCBr8jeppspxSeNdSI_YQc5MIREaaBmOYOhQRkmFqP2XDrcGKwdsLYkaVOeyvSvjOV0xItKZ63w34T-NLUS4EvH3yGyIC92LvAQInmde27Y8EVFzq395V5poBZwd2IsbSI/s72-c/fb_security3.jpg" height="72" width="72"/><thr:total>7</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8494849674688759807.post-4839652537970398931</guid><pubDate>Sun, 02 Jan 2011 07:21:00 +0000</pubDate><atom:updated>2018-09-21T07:17:03.150+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Administrator</category><category domain="http://www.blogger.com/atom/ns#">Blacksheep</category><category domain="http://www.blogger.com/atom/ns#">Cookie</category><category domain="http://www.blogger.com/atom/ns#">Firesheep</category><category domain="http://www.blogger.com/atom/ns#">Google</category><category domain="http://www.blogger.com/atom/ns#">Password</category><category domain="http://www.blogger.com/atom/ns#">Password Hacking</category><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Session</category><category domain="http://www.blogger.com/atom/ns#">Session Hijacking</category><title>Prevent access to Google Apps and reset sign-in cookies.</title><atom:summary type="text">
Google Apps has indeed added a bit of ease to most of the people those who are on move,they can access there favourite google service from anywhere any time if they have access to internet.Suppose the device from where they are accessing the Google Apps account get stolen then the person possessing the device can open their account using the session cookies present in the browser without even </atom:summary><link>https://www.securityhunk.in/2011/01/prevent-access-to-google-apps-and-reset.html</link><author>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSrMhIFpmnuE_pXkUHtpBU1_feoYUu9iEWGIXhcn6OCCoSxbcJ2sgkyYmZNnx-cy3qmS7EQ-lrD4PA7N6jSvBZjNwqnjlCSQ13YlGjCFVY7uEsE9Wq_YpdipHzUeSCaI9l418JTkBR3Dg/s72-c/Google_App.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8494849674688759807.post-3838612165435783119</guid><pubDate>Fri, 31 Dec 2010 11:05:00 +0000</pubDate><atom:updated>2010-12-31T16:35:57.746+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Backtrack</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><category domain="http://www.blogger.com/atom/ns#">Penetration Testing</category><category domain="http://www.blogger.com/atom/ns#">Port scanning</category><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Security Tools</category><category domain="http://www.blogger.com/atom/ns#">Tools</category><title>How to boot Backtrack from USB?</title><atom:summary type="text">I am sure that many of you must have heard of Backtrack and its functionality.So I will not go in detail into what is back track but here I will tell you how you can use it from your USB.
What is Backtrack?
It is a Linux distribution and unix like OS made for pentesting and forensic analysis.It contains all the tools that an elite or a noob security and hacking enthusiast may dream of.

You can </atom:summary><link>https://www.securityhunk.in/2010/12/how-to-boot-backtrack-from-usb.html</link><author>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTukKsRpd_OU6ErORtn5ntit3VEooP5__AvwNr16I2vQ64AmCivdcXp9SOHbugsM2agsqVgG6QFEBRPyfFycjHayA9-_hbFE28dX54sCsCqX3Youz7HYW7v_o_xMK3rNsDBRvkUn4IZI8/s72-c/backtrack-hunk.jpg" height="72" width="72"/><thr:total>9</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8494849674688759807.post-3067435098013972374</guid><pubDate>Thu, 30 Dec 2010 13:41:00 +0000</pubDate><atom:updated>2010-12-30T19:11:19.460+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Backtrack</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Hash</category><category domain="http://www.blogger.com/atom/ns#">Password</category><category domain="http://www.blogger.com/atom/ns#">Password Hacking</category><category domain="http://www.blogger.com/atom/ns#">SAM</category><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><category domain="http://www.blogger.com/atom/ns#">Windows Xp</category><title>Retrieve Windows password using Samdump2 and John with Backtrack4</title><atom:summary type="text">Earlier I posted on &quot;How to hack Windows administrator password&quot; using backtrack.This post is the final post of it where we will see how we can retrieve the password without reseting it.

Here I will be using Backtrack4 and boot it from USB but you can also boot it from a CD.

Requirements:

1.Backtrack 4.iso (Download)

2.UseNetbootin (Download)

If you have any problem in installing backtrack </atom:summary><link>https://www.securityhunk.in/2010/12/retrieve-windows-password-using.html</link><author>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNoxl9gTGqg2YdpA5jNsSYhiEsbIUuXatmlcplGz2eZ1ZTFVAGNg_E8tQUwyStKQkjTWvMPQca3gO82iPyEcD9TR9mByHpcnkcEqALUl_jrFXrZ81B24rJNpswa7pEaIaM5p-kV00BZAM/s72-c/SecurityHunk_hack+WINDOWS.jpg" height="72" width="72"/><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8494849674688759807.post-7826145430627831467</guid><pubDate>Wed, 29 Dec 2010 05:44:00 +0000</pubDate><atom:updated>2010-12-29T17:01:34.388+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Administrator</category><category domain="http://www.blogger.com/atom/ns#">blogger</category><category domain="http://www.blogger.com/atom/ns#">Comment</category><category domain="http://www.blogger.com/atom/ns#">Exploit</category><category domain="http://www.blogger.com/atom/ns#">IpAddress</category><category domain="http://www.blogger.com/atom/ns#">Penetration Testing</category><category domain="http://www.blogger.com/atom/ns#">Port scanning</category><category domain="http://www.blogger.com/atom/ns#">Presentation</category><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><category domain="http://www.blogger.com/atom/ns#">wordpress</category><title>Comments on blogs and its Security Threats</title><atom:summary type="text">Well!!! comments are indeed a very vital and encouraging factor for each and every blogger.We also comment on blogs/sites of our niche and it is also recommended to comment on atleast 10-12 blogs/sites each day.But while commenting we tend to forget the security threats we may encounter while commenting on a site or blog.A simple comment that you drop on a blog/site can endup in compromising your</atom:summary><link>https://www.securityhunk.in/2010/12/comments-on-blogs-and-its-security.html</link><author>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7VQCvgUyUPxLCXYqBDwyne5ZHk0BkIvhxmPG8H8WXonyy_FpZNtdBoXH3xo52-2QHkS1LZqoX4fplSpslVbm0FlD6MNsh3UEvseuhW9CyW6s5RFj-2la3BzOr-fUAdlYMUJzOsawCM8g/s72-c/Comment_securityhunk.jpg" height="72" width="72"/><thr:total>10</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8494849674688759807.post-2834517058680360657</guid><pubDate>Tue, 07 Dec 2010 18:42:00 +0000</pubDate><atom:updated>2018-09-21T07:17:02.923+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Email</category><category domain="http://www.blogger.com/atom/ns#">Exploit</category><category domain="http://www.blogger.com/atom/ns#">Google</category><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Vulnerability</category><category domain="http://www.blogger.com/atom/ns#">Web Hacking</category><category domain="http://www.blogger.com/atom/ns#">Website Hacking</category><category domain="http://www.blogger.com/atom/ns#">XSS</category><title>XSS  Vulnerability threat in Google Web Optimizer</title><atom:summary type="text">
Recently Google has reported a XSS vulnerability security issue with its Web Optimizer code.So,it has requested its users to update the code in their site immediately.Though the level of threat is low but it is recommended to update the code.The&amp;nbsp; attacker may exploit this vulnerability and execute malicious code in the victim&#39;s site but the attack can be successful&amp;nbsp; if the attacker has</atom:summary><link>https://www.securityhunk.in/2010/12/xss-vulnerability-threat-in-google-web.html</link><author>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhf3su0tVs-PmNylsJZUizy24wkRhkr9nSD22XdeZTZqOLpjNPSACd8bAuFOfxvJavn3E-LPY40vEyHf-1h25oN9JhkhPY5zT1fiVrRnjM4-00pLCPQcuSCtMvNO_fNkDzBHOkOw82dV9o/s72-c/xss.jpg" height="72" width="72"/><thr:total>5</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8494849674688759807.post-2561242594389186025</guid><pubDate>Wed, 01 Dec 2010 19:20:00 +0000</pubDate><atom:updated>2019-10-28T17:55:12.341+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Intrusion Detection</category><category domain="http://www.blogger.com/atom/ns#">Penetration Testing</category><category domain="http://www.blogger.com/atom/ns#">RATS</category><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Security Tools</category><category domain="http://www.blogger.com/atom/ns#">Tutorial</category><category domain="http://www.blogger.com/atom/ns#">Virtual Box</category><category domain="http://www.blogger.com/atom/ns#">Virtual Environment</category><category domain="http://www.blogger.com/atom/ns#">Virus</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><category domain="http://www.blogger.com/atom/ns#">Windows Xp</category><title>How to create Virtual Environment using Virtualbox.</title><atom:summary type="text">There are many occasions where we will need to have several operating systems in our computer. Think that you’re a software developer and now you need to test your software under different platforms! Or, you need to try out several operating systems to review about them or to pick the best OS for your machine! Or suppose you download a file from torrent or other external link and don’t trust that</atom:summary><link>https://www.securityhunk.in/2010/12/how-to-create-virtual-environment-using.html</link><author>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6T9_DG9ScVUUushzstwxBkoHe7ji0QZvNlPPlXzon2O3LhfdpQ8Su0dJ8l3boTFogZLXnbDylN-uSELjW7q-myOdkcluJPVIFqSDh-qGmz2wlGw9qZt4nDsl75_v2jOA14nwOSP_TFs8/s72-c/Virtual+environment_securityhunk.jpg" height="72" width="72"/><thr:total>11</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8494849674688759807.post-3885102055509054418</guid><pubDate>Fri, 26 Nov 2010 17:54:00 +0000</pubDate><atom:updated>2019-10-28T17:55:12.355+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Deface</category><category domain="http://www.blogger.com/atom/ns#">Dork</category><category domain="http://www.blogger.com/atom/ns#">Google</category><category domain="http://www.blogger.com/atom/ns#">Remote File Inclusion</category><category domain="http://www.blogger.com/atom/ns#">Shell</category><category domain="http://www.blogger.com/atom/ns#">Tutorial</category><category domain="http://www.blogger.com/atom/ns#">Vulnerability</category><category domain="http://www.blogger.com/atom/ns#">Website Hacking</category><title>Basics of RFI (Remote File Inclusion)  with Tutorial</title><atom:summary type="text">


I recommend readers if they abide by the blog&#39;s Disclaimer then they can proceed reading this post otherwise leave this page immediately.

Before starting this tutorial, I would like to tell you about a piece of code called as  shell. 
There are many shells available . Lets consider a shell known as c99 shell.
First download it from here.



*Now signup for a account on any free web hosting </atom:summary><link>https://www.securityhunk.in/2010/11/basics-of-rfi-remote-file-inclusion.html</link><author>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik4eE-tsfVNoilDO8VkKffJSc3eZD4kZpXGfEYt-vJuvDYfCOabDINffPcNbcuf0-WPW3e-JMn3zuilSKVl-kEV7sVYSpioUn_xQnwSzX2uN-iy2WjBBMl9IXxwsJIIny4RVc0XODR-II/s72-c/Website+Hacking_RFI.jpg" height="72" width="72"/><thr:total>7</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8494849674688759807.post-8923140059368548037</guid><pubDate>Fri, 12 Nov 2010 18:03:00 +0000</pubDate><atom:updated>2019-10-28T17:55:12.487+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Blacksheep</category><category domain="http://www.blogger.com/atom/ns#">Cookie</category><category domain="http://www.blogger.com/atom/ns#">Facebook</category><category domain="http://www.blogger.com/atom/ns#">Firesheep</category><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Session</category><category domain="http://www.blogger.com/atom/ns#">Session Hijacking</category><category domain="http://www.blogger.com/atom/ns#">Tutorial</category><category domain="http://www.blogger.com/atom/ns#">Twitter</category><title>Blacksheep Tutorial | Detect Firesheep and Secure your public WiFi access.</title><atom:summary type="text">
In one of my last post I wrote about &quot;Firesheep Tutorial&quot; which can be used to get control of user&#39;s session.Here in this tutorial I will discuss about a firefox addon called &quot;Blacksheep&quot; that can detect firesheep in the network.So lets start...



What is a Blacksheep?

It is a firefox addon that detects firesheep in an open or public wifi network.The credit goes to Zscaler&amp;nbsp; for bringing </atom:summary><link>https://www.securityhunk.in/2010/11/blacksheep-tutorial-detect-firesheep.html</link><author>noreply@blogger.com (Satyajit (Admins,a.k.a Satosys))</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQL4bx76AqXoDcw7lPBMT9mdh9kZZZRSEZDOi_AbiEXuBc5_f7KZfeiDZNIsI2hJ9zv5rLM9zPmey40xuHjCwE0vMsBAm5l6aXbjkr1rJkjF8PSlJKpOwbobh54ckqrXyrxeMfKGtQ6mM/s72-c/blacksheep_securityhunk.jpg" height="72" width="72"/><thr:total>3</thr:total></item></channel></rss>