<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-5808530752200142057</id><updated>2026-03-14T14:17:15.326-07:00</updated><category term="How To"/><category term="hacking"/><category term="Hacks"/><category term="hacking tools"/><category term="backtrack 5"/><category term="how to hack"/><category term="Google and Facebook exploit"/><category term="Social Engineering"/><category term="backtrack"/><category term="hacking tricks"/><category term="simple hacks"/><category term="sql injection"/><category term="0day hacks"/><category term="DDOS Attack"/><category term="Hack  Windows Password Using Cain And Abel"/><category term="How To Block USB Port"/><category term="How To Convert Text to MP3 Files"/><category term="How To Create Files And Folders With No Name"/><category term="How To Create Message Annoyer"/><category term="How To Create Password Generator Using Command PromptHow To Create Password Generator Using Command Prompt"/><category term="How To Create an eBomb"/><category term="How To Display The Message On Windows XP Welcome Screen"/><category term="How To Display Your FaceBook Status Upside Down"/><category term="How To Hide Drives On Your PC"/><category term="How To Hide IP-Address"/><category term="How To Hide Your Files In Image"/><category term="How To Install Angry IP Scanner In BT5"/><category term="How To Lock A Folder Using Notepad"/><category term="How To Lock Computer Using Shortcut"/><category term="How To Recover Permanently Deleted Files From Your PC"/><category term="How To Set a Proxy In a Firefox"/><category term="How To Trace A Mobile Number In India"/><category term="How To Use Multiple Yahoo Accounts In Yahoo Messenger"/><category term="How to Download Videos from Youtube"/><category term="How to Sniff Passwords Using USB Drive"/><category term="How to get new ip"/><category term="How to make Password Protected Folder"/><category term="How to reset your windows password using command prompt"/><category term="Install Ubuntu Software Center For Backtrack5"/><category term="Installing Chromium Browser"/><category term="Internet"/><category term="Make A Prank Error Messages On Windows"/><category term="SQLInjection"/><category term="Social Engineering Tool KIt"/><category term="System"/><category term="Windows Administrator Password Hacking"/><category term="anonymous ftp scanner"/><category term="arp sppofing"/><category term="backtrack commands"/><category term="bactrack"/><category term="bactrack set"/><category term="cain hacking"/><category term="commands for hacking"/><category term="comments"/><category term="crack md5 passwords"/><category term="ethical hacks"/><category term="facebook hacking is carried out by 5 methods"/><category term="ftp hacks"/><category term="ghdb hacks"/><category term="god mode"/><category term="google hacks"/><category term="hack"/><category term="hack ftp"/><category term="hack script kiddies"/><category term="hack using google"/><category term="hack wep"/><category term="hackers"/><category term="hacking backtrack"/><category term="hacking roboform"/><category term="hacking whatsapp"/><category term="hacking whatsapp with Kali linux"/><category term="hacking with cain"/><category term="hacks 0day"/><category term="hacks google"/><category term="hash for files"/><category term="hash identifier"/><category term="how to find out hash for files"/><category term="how to install vlc media player in backtrack"/><category term="how to spoof mac address"/><category term="how to tips"/><category term="linux"/><category term="list of hacking tools"/><category term="metasploit"/><category term="metasploitable"/><category term="passwords sniffing"/><category term="php shells"/><category term="roboform hakcs"/><category term="sniff passwords"/><category term="spoof mac address"/><category term="spoofing"/><category term="sqlmap"/><category term="tools for hacking"/><category term="tricks"/><category term="uploading shell"/><category term="vlc media player tricks"/><category term="web hacking"/><category term="wep hack"/><category term="what is arp spoofing"/><category term="whatsapp hacking"/><category term="wif"/><category term="windows 7 god mode"/><title type='text'>Ethical Hacking</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default?start-index=26&amp;max-results=25'/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>123</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-5808530752200142057.post-3521145033791888991</id><published>2018-12-21T18:21:00.001-08:00</published><updated>2018-12-21T18:21:01.850-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking whatsapp"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking whatsapp with Kali linux"/><category scheme="http://www.blogger.com/atom/ns#" term="whatsapp hacking"/><title type='text'>Hacking Whatsapp With Kali Linux</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Hacking whatsapp is the major thing these days as every one are on whatsapp and information on whatsapp is crucial for business and personal use. Whatsapp is an app which is used for real time communication between the users by providing unique id (phone number).&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
The real time communication helps people to text, call and video chat through application.&lt;br /&gt;
The following information which we provide must only use for learning purposes and to to find exploits in an apps.&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;iframe allow=&quot;accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;480&quot; src=&quot;https://www.youtube.com/embed/cq6uP-DFdLo&quot; width=&quot;653&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/3521145033791888991/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://theethicalhackerz.blogspot.com/2018/12/hacking-whatsapp-with-kali-linux.html#comment-form' title='40 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/3521145033791888991'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/3521145033791888991'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/2018/12/hacking-whatsapp-with-kali-linux.html' title='Hacking Whatsapp With Kali Linux'/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/cq6uP-DFdLo/default.jpg" height="72" width="72"/><thr:total>40</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5808530752200142057.post-5396827284424995687</id><published>2018-12-21T17:56:00.000-08:00</published><updated>2018-12-21T17:57:39.771-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Google and Facebook exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="google hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="hack using google"/><category scheme="http://www.blogger.com/atom/ns#" term="hacks google"/><title type='text'>List Of Best Google Dorks To Find Juicy info</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Its been so long that i havent been posted on my blog.&lt;br /&gt;
I am developing so much stuff so i couldn&#39;t focus much on my blog, so these days exploiting servers, people and their passwords became relatively too easy. Social engineering became easy with dumb users and for clever ones its quite sort of hard.&lt;br /&gt;
Back to post now, i am providing list of dork which will display passwords, admin names, usernames, vulnerable directories etc., list goes as follows.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;
&lt;b&gt;

                                                            inurl:wp-config.bak&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Dork is used to find the useful data of wordpress cms, as 70% of internet is powered by php and wordpress, so this dork helps to find the usernames and passwords in wp-config.bak file&lt;b&gt;.&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;&lt;br /&gt;inurl:&quot;trello.com&quot; and intext:&quot;username&quot; and intext:&quot;password&quot;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
The above dork is used to find juicy info like usernames and passwords from trello website. You may find useful.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;/b&gt;
&lt;b&gt;intext:password &quot;Login Info&quot; filetype:txt&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The above dork displays lot of information, its better you find out by searching the information and juicy stuff.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&quot;index of /&quot; authorized_keys&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
helps to find authorized_keys ssh and some rsa files in a server&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&amp;nbsp;&quot;password.xlsx&quot; ext:xlsx&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The followng dork is used to find excel files which containing passwords from google search engines&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;inurl:wp-config-backup.txt&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
You can see username and password of wordpress database by this dork, try this dork. It will help you to secure your server if youre using the wordpress&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;inurl:/host.txt + filetype:txt + &quot;password&quot;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The following dork helps to find host, usernames and passwords of website, take a look at it and happy hacking.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt; &lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;/b&gt;&lt;br /&gt;
There are many more dorks available in the internet where you can get lot of juicy information. I found these dorks are good example for learning google search exploit finding&lt;br /&gt;
&lt;b&gt;&lt;/b&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/5396827284424995687/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://theethicalhackerz.blogspot.com/2018/12/list-of-best-google-dorks-to-find-juicy.html#comment-form' title='63 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/5396827284424995687'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/5396827284424995687'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/2018/12/list-of-best-google-dorks-to-find-juicy.html' title='List Of Best Google Dorks To Find Juicy info'/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>63</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5808530752200142057.post-6563401986567963773</id><published>2015-07-02T16:14:00.000-07:00</published><updated>2015-07-02T16:25:36.693-07:00</updated><title type='text'>Find ajax calls fields in your web browser</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
most of the coders don&#39;t know,how the values are updated to database, but when you make an ajax call it will show in your browser.&lt;br /&gt;
For example if i do any change which was directed by ajax function then script automatically sends data to database.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
This is image when we does not make ajax call.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGuFsljbJdSqPhpiprxeRX1ZY2cMDh9x-1rfaur8oCh0hm5RPBfJscn1mEZGEjsyl0RnCycuJxECIGijZMiIH53vKsZTaf2GKtp3riM_hvpPufgH_oU7zMQzyEfrJReIFhI-44j2KWjgc/s1600/1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;185&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGuFsljbJdSqPhpiprxeRX1ZY2cMDh9x-1rfaur8oCh0hm5RPBfJscn1mEZGEjsyl0RnCycuJxECIGijZMiIH53vKsZTaf2GKtp3riM_hvpPufgH_oU7zMQzyEfrJReIFhI-44j2KWjgc/s320/1.png&quot; width=&quot;320&quot; /&gt;&amp;nbsp;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
This is the image when we make an ajax call.&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVzalhLnmfQCl9h0zPc7jftK56S5eupzP7L_1_Dxr-uLL1ew2peCv0hf03A6M045NLiShLhtLzXFraupzXbVA1gmjz9GhMVHwtvuoljgomlZj_DGCJe_GYgDQb6MbD4ny8zLXqSUCusi0/s1600/2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;138&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVzalhLnmfQCl9h0zPc7jftK56S5eupzP7L_1_Dxr-uLL1ew2peCv0hf03A6M045NLiShLhtLzXFraupzXbVA1gmjz9GhMVHwtvuoljgomlZj_DGCJe_GYgDQb6MbD4ny8zLXqSUCusi0/s320/2.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/6563401986567963773/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://theethicalhackerz.blogspot.com/2015/07/find-ajax-calls-fields-in-your-web.html#comment-form' title='21 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/6563401986567963773'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/6563401986567963773'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/2015/07/find-ajax-calls-fields-in-your-web.html' title='Find ajax calls fields in your web browser'/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGuFsljbJdSqPhpiprxeRX1ZY2cMDh9x-1rfaur8oCh0hm5RPBfJscn1mEZGEjsyl0RnCycuJxECIGijZMiIH53vKsZTaf2GKtp3riM_hvpPufgH_oU7zMQzyEfrJReIFhI-44j2KWjgc/s72-c/1.png" height="72" width="72"/><thr:total>21</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5808530752200142057.post-1672937737183003141</id><published>2013-12-13T03:44:00.000-08:00</published><updated>2013-12-13T03:44:05.457-08:00</updated><title type='text'>Exploiting Server Tutorial</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
A simple tutorial on exploiting the server.

&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;300&quot; src=&quot;//www.youtube.com/embed/U00D2GslDsU?feature=player_detailpage&quot; width=&quot;440&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/1672937737183003141/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/12/exploiting-server-tutorial.html#comment-form' title='16 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/1672937737183003141'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/1672937737183003141'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/12/exploiting-server-tutorial.html' title='Exploiting Server Tutorial'/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>16</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5808530752200142057.post-2995523659384543813</id><published>2013-12-01T10:04:00.004-08:00</published><updated>2013-12-01T10:04:54.080-08:00</updated><title type='text'>Tutorial On XSS[Video]</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
A simple video on Cross site scripting, a website hacking technique which is used for injecting malicious javascript with the help of &amp;nbsp;browser.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;310&quot; src=&quot;//www.youtube.com/embed/OVLz6RgOjIY&quot; width=&quot;454&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/2995523659384543813/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/12/tutorial-on-xssvideo.html#comment-form' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/2995523659384543813'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/2995523659384543813'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/12/tutorial-on-xssvideo.html' title='Tutorial On XSS[Video]'/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5808530752200142057.post-4000573624097557256</id><published>2013-12-01T05:29:00.001-08:00</published><updated>2013-12-01T05:29:03.114-08:00</updated><title type='text'>Find Out Name Of Unknown Number</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Now a days many prank are going over the mobile. People might be friends, enemies, relatives or anybody.&lt;br /&gt;
We dont know who is pranking with us. In this post i will explain to you to find out the name of the person who is pranking with you.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
Actually this is so simple to find out the person name by visiting to &lt;a href=&quot;http://www.truecaller.com/&quot; target=&quot;_blank&quot;&gt;Truecaller&lt;/a&gt;.&lt;br /&gt;
True caller is an app which helps us to find out the numbers which are provided in their directory. If you install this app on your mobile which has internet, then you can easily find out a person name who is pranking with you.&lt;br /&gt;
&lt;br /&gt;
All you have to do is go truecallers website or to have a true caller app on your mobile.&lt;br /&gt;
&lt;br /&gt;
Enter the number in true caller you will get the person&#39;s name of an unknown number.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjm6yk6hXu3FmukA5aKadPwKa9tGl5RdmOkWXUnFeXAYNNpkgrvEOk8deJ46JCrYmeQs0jnwc9_q_R1Q59h6hcjCROl9ltNi2BCC_DZkQ2VG9b3cVtXBPjHtheEuykjZyCOz7N-BhosEEs/s1600/Truecaller+++Global+phone+directory.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;165&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjm6yk6hXu3FmukA5aKadPwKa9tGl5RdmOkWXUnFeXAYNNpkgrvEOk8deJ46JCrYmeQs0jnwc9_q_R1Q59h6hcjCROl9ltNi2BCC_DZkQ2VG9b3cVtXBPjHtheEuykjZyCOz7N-BhosEEs/s320/Truecaller+++Global+phone+directory.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/4000573624097557256/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/12/find-out-name-of-unknown-number.html#comment-form' title='14 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/4000573624097557256'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/4000573624097557256'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/12/find-out-name-of-unknown-number.html' title='Find Out Name Of Unknown Number'/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjm6yk6hXu3FmukA5aKadPwKa9tGl5RdmOkWXUnFeXAYNNpkgrvEOk8deJ46JCrYmeQs0jnwc9_q_R1Q59h6hcjCROl9ltNi2BCC_DZkQ2VG9b3cVtXBPjHtheEuykjZyCOz7N-BhosEEs/s72-c/Truecaller+++Global+phone+directory.png" height="72" width="72"/><thr:total>14</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5808530752200142057.post-2888414793492334153</id><published>2013-12-01T04:12:00.001-08:00</published><updated>2013-12-01T04:12:12.370-08:00</updated><title type='text'>Google Dorks Helps Hackers To Find Passwords In Search engines</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Most of the people know that, passwords of the users may be found on Google. Question arises how??&lt;br /&gt;
Its simple previously some body might have been hacked the passwords of them.&lt;br /&gt;
If you search any email address in Google , then list of sites in which your email address has been registered will be displayed on it.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Most of the people like bloggers use this technique for getting mails of the users who are active in internet and do some malicious activity to them by sending phishing or by spamming. Google is too powerful for security researchers to undergo any process of hacking.&lt;br /&gt;
&lt;br /&gt;
Dorks are nothing but queries of Google which help you get information, passwords, data etc., in security point of view. When you query out any dork in Google, you will get list of sites with information, it may be passwords, data,texts, audios and my be videos too.&lt;br /&gt;
I dont want to prolong too much about this, so in order to find out passwords here is the list of dorks which help you get passwords online. Simple query it in Google , you will find the passwords.&lt;br /&gt;
&lt;br /&gt;
ext:sql intext:@gmail.com intext:password&lt;br /&gt;
site:github.com inurl:sftp-config.json&lt;br /&gt;
filetype:config inurl:web.config inurl:ftp&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;and the complete list can be found&lt;a href=&quot;http://www.exploit-db.com/google-dorks/9/&quot; target=&quot;_blank&quot;&gt; here.&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/2888414793492334153/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/12/google-dorks-helps-hackers-to-find.html#comment-form' title='160 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/2888414793492334153'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/2888414793492334153'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/12/google-dorks-helps-hackers-to-find.html' title='Google Dorks Helps Hackers To Find Passwords In Search engines'/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>160</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5808530752200142057.post-3713229193626984300</id><published>2013-11-24T01:36:00.002-08:00</published><updated>2013-11-24T01:36:55.418-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking tools"/><category scheme="http://www.blogger.com/atom/ns#" term="list of hacking tools"/><category scheme="http://www.blogger.com/atom/ns#" term="tools for hacking"/><title type='text'>Ethical Hacking Tools</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
Ethical Hacking , as you know protecting corporate or users from the unprotected world. Most of the companies hire people to test their product by hacking in to it. Hackers who are good are known as ethical hackers(white hat hackers) and hackers who are bad, i mean who steal credit cards, money, hack passwords for personal and commercial use are know black hat hackers.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
So in order to hack we need some of the tools to play around. Here are the listof tools which comes handy for the hackers to use. But i suggest you to use Backtrack Linux or Kali Linux, as linux is most used operating system by hackers.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
Lets jump in to handy tools for hackers.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
1.&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.oxid.it/cain.html&quot; style=&quot;color: #1155cc;&quot; target=&quot;_blank&quot;&gt;Cain &amp;amp; Abel:&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
Cain is one of the awesome tool which is used for cracking passwords, networking sniffing, MITM(Man In The Middle Attack) and many more attacks. With the help of this tool we hackers mostly sniff networks and crack simple passwords of windows, MD5 etc.,&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
If you want some serious action of hacking scene then use this tool. It is real handy tool for hackers. As it is not supported in Linux you must Install It by Wine in Linux.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
2.&lt;span class=&quot;Apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://ettercap.github.io/ettercap/&quot; style=&quot;color: #1155cc;&quot; target=&quot;_blank&quot;&gt;Ettercap&lt;/a&gt;:&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
Ettercap is my favorite tool which is used for network sniffing and man in the middle attacks. With the help of this tool i hacked many networks. When i log in my PC , i do attack entire network and i do sniff many passwords with the help of this tool. I recommend to use this tool of educational purposes. This tool can hack Yahoo, Google , Msn passwords by sniffing in to their networks.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
There is a little disadvantage of this tool, we cannot use this in windows, it only supports linux. Dont forget to use Ettercap for hacking networks, i almost hacked 1,00,000 of my network account.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
3. &lt;a href=&quot;http://nmap.org/&quot; target=&quot;_blank&quot;&gt;Nmap:&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
Nmap as you know famous tool for scanning networks , i mainly use nmap for exploiting loop hole , reverse ip, mail servers, FTP&#39;s and etc., Nmap is really handy tool for scanning part. Best part of nmap is that it supports windows and linux.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
4. &lt;a href=&quot;http://www.wireshark.org/download.html&quot; target=&quot;_blank&quot;&gt;WireShark&lt;/a&gt;:&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
Wireshark is famous tool which is used for Complete Network sniffing, it sniff each and every packet of&amp;nbsp; the network. Wireshark helps us to detect each and every detail of the packet from where it is getting&amp;nbsp; from and where it going to. These packets play crucial role in network sniffing.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
5.&lt;a href=&quot;https://www.trustedsec.com/downloads/social-engineer-toolkit/&quot; target=&quot;_blank&quot;&gt; SET&lt;/a&gt;:&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: #222222; font-family: arial; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
SET is known as social engineering tool kit, which is used for phishing purposes, this is one of the best app for phishing. In backtrack, SET is built in so there is no need to install it again.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/3713229193626984300/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/11/ethical-hacking-tools.html#comment-form' title='6 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/3713229193626984300'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/3713229193626984300'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/11/ethical-hacking-tools.html' title='Ethical Hacking Tools'/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>6</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5808530752200142057.post-3267034936993392523</id><published>2013-10-15T10:44:00.000-07:00</published><updated>2013-10-15T10:44:16.488-07:00</updated><title type='text'>How I Do Social Engineering</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b&gt;How I Do Social Engineering&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Humans non sense is the main thing for hacking lot of websites, even weak passwords also helps users to hack accounts. Due to Social Engineering many accounts are getting hacked. In order to make some sense here is a simple example , i do social engineering.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
1. I ll give a call or ping up my friend, who is amateur who don&#39;t know about hacking or phishing. &lt;br /&gt;
2. Next i will send him a simple link for download or to get cookies, which i made with set(Social Engineering Tool Kit).&lt;br /&gt;
3. When a victim clicks the link, his browser cookies are stored on to my terminal.&lt;br /&gt;
4. Next thing i do is session hijacking.&lt;br /&gt;
&lt;br /&gt;
This is the simple procedure, i use to hack victims by social engineering.&lt;br /&gt;
Above is the simple scenario, when i want to hack anyone which i have physical access to it.&lt;br /&gt;
&lt;br /&gt;
I will explain a scenario , i created a metasploit shell and executable which i stored in my pendrive.&lt;br /&gt;
I will make my executable to Fully Undetectable and i will add the file to my friends PC and i will get access to that PC. In this way i will create different scenarios for gaining access by social engineering.&lt;br /&gt;
&lt;br /&gt;
Share your type of social engineering in comments.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/3267034936993392523/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/10/how-i-do-social-engineering.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/3267034936993392523'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/3267034936993392523'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/10/how-i-do-social-engineering.html' title='How I Do Social Engineering'/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5808530752200142057.post-4297789558292828829</id><published>2013-09-09T20:54:00.002-07:00</published><updated>2013-09-09T20:54:37.349-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ftp hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="hack ftp"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks"/><title type='text'>How To Hack Unprotected FTP&#39;s </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Google is one of the powerful search engine and every body knows that. Google helps us to find passwords with its search ability, so in order to hack unprotected and low secure FTP&#39;s passwords, this method will help out.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
So go to Google and search in a keyword below, which displays the list of unprotected FTP Server passwords.&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
inurl:ftp &quot;password&quot; filetype:xls&lt;/blockquote&gt;
&lt;br /&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/4297789558292828829/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/09/how-to-hack-unprotected-ftps.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/4297789558292828829'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/4297789558292828829'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/09/how-to-hack-unprotected-ftps.html' title='How To Hack Unprotected FTP&#39;s '/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5808530752200142057.post-4553564114640234484</id><published>2013-09-08T22:35:00.001-07:00</published><updated>2013-09-08T22:35:17.068-07:00</updated><title type='text'>Brute Forcing Wordpress</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
IN the hacking world , brute force attack became the common answer to get the passwords, in order to crack the passwords we need to brute force. &lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;WordPress which is the biggest CMS platform used by millions of users has a brute force attack vulnerability, In the below video you will know how to brute force the passwords.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;360&quot; src=&quot;http://www.youtube.com/embed/jADzC0ehIms?feature=player_detailpage&quot; width=&quot;640&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/4553564114640234484/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/09/brute-forcing-wordpress.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/4553564114640234484'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/4553564114640234484'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/09/brute-forcing-wordpress.html' title='Brute Forcing Wordpress'/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/jADzC0ehIms/default.jpg" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5808530752200142057.post-510662965150971578</id><published>2013-08-29T12:52:00.002-07:00</published><updated>2013-08-29T13:01:33.335-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="0day hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="hacks 0day"/><title type='text'>Facebook 0day Vulnerability To Get Message From Any One</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
I was browsing over the internet, then i found many 0day exploits but interestingly i found out facebook 0day vulnerability. This exploit has not been reported to facebook but this is the exploit which is to be taken care of.&lt;br /&gt;
Watch the video and you will get to know about the vulnerability.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;360&quot; src=&quot;http://www.youtube.com/embed/JSt0OwSm82k?feature=player_embedded&quot; width=&quot;640&quot;&gt;&lt;/iframe&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/510662965150971578/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/08/facebook-0day-vulnerability-to-get.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/510662965150971578'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/510662965150971578'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/08/facebook-0day-vulnerability-to-get.html' title='Facebook 0day Vulnerability To Get Message From Any One'/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/JSt0OwSm82k/default.jpg" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5808530752200142057.post-1777805658094193552</id><published>2013-05-24T10:06:00.001-07:00</published><updated>2013-05-24T10:09:16.399-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hack"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Social Engineering"/><title type='text'>Social engineering tips</title><content type='html'>Do you know social engineering is the best method to hack human passwords. Social engineering is easy when you know how to get passwords by hacking humans nature.&amp;nbsp;&lt;div&gt;I never found this method as hard. When I tried to social engineer by boss password , it was too easy to gain access to my boss Facebook id.&amp;nbsp;&lt;/div&gt;&lt;div&gt;I simply sent malicious phishing link to him. He opened the link and got phished easily.&amp;nbsp;&lt;/div&gt;&lt;div&gt;There are most of morons to hack in the web with this simple social engineering tip.&amp;nbsp;&lt;/div&gt;&lt;div&gt;In the previous tutorial I explained how to create fake pages ie phishing pages .&lt;/div&gt;&lt;div&gt;You can create any phishing pages with the help of simple tools in backtrack 5.&lt;/div&gt;&lt;div&gt;As you know Set is the tool kit used to create phishing pages .&lt;/div&gt;&lt;div&gt;When it comes to social engineering , you need to have good communication skills.&amp;nbsp;&lt;/div&gt;&lt;div&gt;Lot off leverages we get by simple human stupidity.&amp;nbsp;&lt;/div&gt;&lt;div&gt;Simple tips to know to do best social engineering methods are as follows&amp;nbsp;&lt;/div&gt;&lt;div&gt;1. Make victims to believe that you are true.&lt;/div&gt;&lt;div&gt;2. Transfer malicious links in undoubted way.&lt;/div&gt;&lt;div&gt;3. Run a metasploit in a proper way , Sk that victim does not know our malicious nature.&lt;/div&gt;&lt;div&gt;4. Be creative while sending malicious links .&amp;nbsp;&lt;/div&gt;&lt;div&gt;5. Send emails in a genuine format.&lt;/div&gt;&lt;div&gt;6. Don&#39;t give up until you get password.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/1777805658094193552/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/05/social-engineering-tips.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/1777805658094193552'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/1777805658094193552'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/05/social-engineering-tips.html' title='Social engineering tips'/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5808530752200142057.post-7913962228893780433</id><published>2013-03-29T01:25:00.001-07:00</published><updated>2013-03-29T01:27:42.221-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="simple hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="vlc media player tricks"/><title type='text'>VLC Media Player Trick</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&amp;nbsp;Most of the people does not now what is vls media player trick. If you know no body will search for this trick.mostly you end up here because you are searching for that trick. So forget about that lets get in to this trick.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqEMGqfjAjUJJKlqGxmMqv7iN2PMrBaANsLx0YV1_MzbNQ-m1uSTnIPBjSZVTxWvO44y5FmiDdiq2woXIG0wPF0z0khKe43oFTh8fPxm1HXX2mgQBwptH2ZgIBgPy3kV_a4L8bieLPhWs/s1600/vlc+trick.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;179&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqEMGqfjAjUJJKlqGxmMqv7iN2PMrBaANsLx0YV1_MzbNQ-m1uSTnIPBjSZVTxWvO44y5FmiDdiq2woXIG0wPF0z0khKe43oFTh8fPxm1HXX2mgQBwptH2ZgIBgPy3kV_a4L8bieLPhWs/s320/vlc+trick.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Open VLC media player.&lt;br /&gt;
2. Press CTRL + N in your VLC media player and type the following&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&amp;nbsp;Screen://&lt;/blockquote&gt;
&lt;/blockquote&gt;
3. Click on play , trick will be working !!!!&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/7913962228893780433/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/03/vlc-media-player-trick.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/7913962228893780433'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/7913962228893780433'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/03/vlc-media-player-trick.html' title='VLC Media Player Trick'/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqEMGqfjAjUJJKlqGxmMqv7iN2PMrBaANsLx0YV1_MzbNQ-m1uSTnIPBjSZVTxWvO44y5FmiDdiq2woXIG0wPF0z0khKe43oFTh8fPxm1HXX2mgQBwptH2ZgIBgPy3kV_a4L8bieLPhWs/s72-c/vlc+trick.png" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5808530752200142057.post-8754843587474618725</id><published>2013-03-29T00:12:00.003-07:00</published><updated>2013-03-29T00:12:56.495-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="god mode"/><category scheme="http://www.blogger.com/atom/ns#" term="windows 7 god mode"/><title type='text'>Enabling God Mode In Windows</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
In the following tutorial i will show you how to enable god mode in your windows machine.&lt;br /&gt;
By enabling god mode you will have complete access to the windows settings. To enable this god mode follow this tutorial.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
1. Right on your desktop free space.&lt;br /&gt;
2. create new folder and rename the folder with the following name.&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
{ED7BA470-8E54-465E-825C-9971204­3E01C}&lt;/blockquote&gt;
&lt;/blockquote&gt;
&amp;nbsp;3.&amp;nbsp; After renaming the following folder now open the following folder , now god mode will be enabled on your computer and you can access every setting in the windows.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/8754843587474618725/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/03/enabling-god-mode-in-windows.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/8754843587474618725'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/8754843587474618725'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/03/enabling-god-mode-in-windows.html' title='Enabling God Mode In Windows'/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5808530752200142057.post-5696086362178402767</id><published>2013-03-29T00:07:00.001-07:00</published><updated>2013-03-29T00:07:20.361-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ghdb hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking roboform"/><category scheme="http://www.blogger.com/atom/ns#" term="roboform hakcs"/><title type='text'>How To Hack People Who Use Roboform</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Hacking people is really fun , only thing is to target the user and get the passwords. This is too main stream for hackers. So in order to hack the passwords, we should know some knowledge about the coding stuff. So forget all these now start hacking&amp;nbsp; and stop blabbering.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;
Now hacking the people who are using roboform right? What is roboform?&lt;br /&gt;
Roboform is an application which is used for storing the passwords and the details of the users.&lt;br /&gt;
If you want to know more about the roboform , please google about it , i have no patience to explain about it ;)&lt;br /&gt;
So if you serach the following query in google the list of the roboform files wil appears there for you can extract the deatils of the users.&lt;br /&gt;
&lt;br /&gt;
1. Open up Google.&lt;br /&gt;
2. Type the following in the query.&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&quot;My RoboForm Data&quot; &quot;index of&quot;&lt;/blockquote&gt;
3. Now get the Roboform files.&lt;br /&gt;
4. That&#39;s it!!!! &lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/5696086362178402767/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/03/how-to-hack-people-who-use-roboform.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/5696086362178402767'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/5696086362178402767'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/03/how-to-hack-people-who-use-roboform.html' title='How To Hack People Who Use Roboform'/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5808530752200142057.post-8741962748301233214</id><published>2013-03-29T00:00:00.000-07:00</published><updated>2013-03-29T00:00:07.090-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ethical hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacks"/><category scheme="http://www.blogger.com/atom/ns#" term="simple hacks"/><title type='text'>How To Make Web Browser As  Text Editor</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Make your web browser as text editor , have ever wondered making your wb browser as text editor?&lt;br /&gt;
IF not then follow this simple tutorial on making your web browser as text editor.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
1. Open your browser.&lt;br /&gt;
2. Type the following in the url bar.&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
data:text/html, &amp;lt;html contenteditable&amp;gt;&lt;/blockquote&gt;
&lt;br /&gt;
3. Now hit enter,&amp;nbsp; your web browser will acts as text editor.&lt;br /&gt;
4. That&#39;s it!!!! &lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/8741962748301233214/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/03/how-to-make-web-browser-as-text-editor.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/8741962748301233214'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/8741962748301233214'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/03/how-to-make-web-browser-as-text-editor.html' title='How To Make Web Browser As  Text Editor'/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5808530752200142057.post-2560806368627910378</id><published>2013-03-28T23:49:00.000-07:00</published><updated>2013-03-28T23:49:04.883-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hack wep"/><category scheme="http://www.blogger.com/atom/ns#" term="wep hack"/><category scheme="http://www.blogger.com/atom/ns#" term="wif"/><title type='text'>How To Hack WEP Wifi</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
This is video tutorial for the users to hack the wifi network which are using WEP networks.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&amp;lt;iframe width=&quot;640&quot; height=&quot;360&quot; src=&quot;http://www.youtube.com/embed/Qy8Cc_qPRHA?feature=player_detailpage&quot; frameborder=&quot;0&quot; allowfullscreen&amp;gt;&amp;lt;/iframe&amp;gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/2560806368627910378/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/03/how-to-hack-wep-wifi.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/2560806368627910378'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/2560806368627910378'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/03/how-to-hack-wep-wifi.html' title='How To Hack WEP Wifi'/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5808530752200142057.post-2032332503140614835</id><published>2013-03-02T10:44:00.000-08:00</published><updated>2013-03-02T10:44:05.979-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="arp sppofing"/><category scheme="http://www.blogger.com/atom/ns#" term="spoofing"/><category scheme="http://www.blogger.com/atom/ns#" term="what is arp spoofing"/><title type='text'>What is ARP Spoofing?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b&gt;What is ARP Spoofing?&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
ARP(Address Resolution Protocol) Spoofing is a method where attacker sends fake(ARP) messages in wired or wireless LAN(Local Area Network).&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
ARP spoofing allows an attacker to do different kinds of attacks like session hijacking,DNS Spoofing, DOS(denial of service attacks),MITM(Man In The Middle) attacks.&lt;br /&gt;
&lt;br /&gt;
List of tools used for ARP Spoofing.&lt;br /&gt;
&lt;br /&gt;
1. Cain For Windows. &lt;a href=&quot;http://theethicalhackerz.blogspot.com/2013/03/arp-poisoning-with-cainvideo.html&quot; target=&quot;_blank&quot;&gt;Here is the tutorial to for ARP poisioning In Cain&lt;/a&gt;&lt;br /&gt;
2. Ettercap (Linux and Windows).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/2032332503140614835/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/03/what-is-arp-spoofing.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/2032332503140614835'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/2032332503140614835'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/03/what-is-arp-spoofing.html' title='What is ARP Spoofing?'/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5808530752200142057.post-1869460770095726126</id><published>2013-03-02T10:43:00.000-08:00</published><updated>2013-03-02T10:43:11.362-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cain hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking with cain"/><category scheme="http://www.blogger.com/atom/ns#" term="passwords sniffing"/><category scheme="http://www.blogger.com/atom/ns#" term="sniff passwords"/><title type='text'>ARP Poisoning With Cain[video]</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b&gt;ARP Poisoning With Cain&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;/div&gt;
Cain can sniff passwords in the network, watch this video to sniff passwords with cain.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;


&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;360&quot; src=&quot;http://www.youtube.com/embed/dbxG1sT3MSI?feature=player_detailpage&quot; width=&quot;640&quot;&gt;&lt;/iframe&gt;

Thanks for Eric Roberts for providing awesome videro for
ARP Poisoning With Cain for Network Sniffing&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/1869460770095726126/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/03/arp-poisoning-with-cainvideo.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/1869460770095726126'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/1869460770095726126'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/03/arp-poisoning-with-cainvideo.html' title='ARP Poisoning With Cain[video]'/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/dbxG1sT3MSI/default.jpg" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5808530752200142057.post-5047873048337869756</id><published>2013-03-01T04:59:00.000-08:00</published><updated>2013-03-01T04:59:14.943-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="backtrack"/><category scheme="http://www.blogger.com/atom/ns#" term="backtrack commands"/><category scheme="http://www.blogger.com/atom/ns#" term="commands for hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking backtrack"/><title type='text'>Useful Commands In Backtrack</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Backtrack is a hacking linux, as most of the people do know about it right. So basically backtrack is powerful and useful linux for security researchers. Security researchers always penetrate in to web applications and find vulnerabiltis in an application. In order to use Backtrack Linux these commands will be helpful to you.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
1. ls&lt;br /&gt;
&lt;br /&gt;
ls command is for listing all the files.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. startx&lt;br /&gt;
&lt;br /&gt;
This&amp;nbsp; command is used to start the backtrack GUI(graphical user interface) to an Linux.&lt;br /&gt;
&lt;br /&gt;
3. logout&lt;br /&gt;
&lt;br /&gt;
This command is use to logout the present session of an user in backtrack.&lt;br /&gt;
&lt;br /&gt;
4. shutdown&lt;br /&gt;
&lt;br /&gt;
Shutdown command is used to shutdown the backtrack linux.&lt;br /&gt;
&lt;br /&gt;
5. msfconsole(Metasploit Framework)&lt;br /&gt;
&lt;br /&gt;
msfconsole command is used to start the metasploit framework, Metasploit is used for penetrating web applications and other applications&lt;br /&gt;
&lt;br /&gt;
6. apt-get install&lt;br /&gt;
&lt;br /&gt;
This command helps Backtrack user to install applications in a linux.&lt;br /&gt;
&lt;br /&gt;
7. apt-get update&lt;br /&gt;
&lt;br /&gt;
This command is used for updating backtrack linux from their repositories. &lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/5047873048337869756/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/03/useful-commands-in-backtrack.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/5047873048337869756'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/5047873048337869756'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/03/useful-commands-in-backtrack.html' title='Useful Commands In Backtrack'/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5808530752200142057.post-8387490784623905754</id><published>2013-03-01T03:22:00.001-08:00</published><updated>2013-03-01T03:22:42.408-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="php shells"/><category scheme="http://www.blogger.com/atom/ns#" term="uploading shell"/><title type='text'>How To Upload A Shell In Web Applications</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b&gt;How To Upload A Shell In Web Applications&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Most of the people will exploit servers with file upload vulnerability , as it is very simple to find out this exploit by an simple dork&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
inurl:upload.php or&amp;nbsp; inurl:upload.html&lt;/blockquote&gt;
Now you have upload a shell file in the upload option. Normally upload option of an web Apps never accepts php files, as most of the shells are php.&lt;br /&gt;
In order to upload php shell in web apps follow these steps&lt;br /&gt;
&lt;ol style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;Rename the shell abc.php to abc.php.txt and upload that shell and run the /path/xyz.php.txt&lt;/li&gt;
&lt;li&gt;Rename the shell as abc.php.xyz which will bypass a simple filter on .php and Apache will still use .php as extension; since this configuration it doesn&#39;t have handler for .xyz&lt;/li&gt;
&lt;li&gt;Rename the shell as .php3 and upload it to server(web apps).&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/8387490784623905754/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/03/how-to-upload-shell-in-web-applications.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/8387490784623905754'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/8387490784623905754'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/2013/03/how-to-upload-shell-in-web-applications.html' title='How To Upload A Shell In Web Applications'/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5808530752200142057.post-586194465410291440</id><published>2012-10-29T08:44:00.001-07:00</published><updated>2012-10-29T08:44:04.510-07:00</updated><title type='text'>How To Clone Sim Cards</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Have you ever tried of hacking sim cards. IF not follow this tutorial on cloning sim cards.&lt;br /&gt;
This is simple video tutorial where creating sim card reader is hard work and brute forcing is time consuming work. If you really want to clone sim card, you must have sim card reader and sim card reader application. I guess you can understand by watching this video.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;iframe allowfullscreen=&quot;allowfullscreen&quot; frameborder=&quot;0&quot; height=&quot;300&quot; mozallowfullscreen=&quot;mozallowfullscreen&quot; src=&quot;http://player.vimeo.com/video/1404007&quot; webkitallowfullscreen=&quot;webkitallowfullscreen&quot; width=&quot;400&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/586194465410291440/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://theethicalhackerz.blogspot.com/2012/10/how-to-clone-sim-cards.html#comment-form' title='5 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/586194465410291440'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/586194465410291440'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/2012/10/how-to-clone-sim-cards.html' title='How To Clone Sim Cards'/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>5</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5808530752200142057.post-9079552619777728243</id><published>2012-10-29T08:29:00.001-07:00</published><updated>2012-10-29T08:29:46.068-07:00</updated><title type='text'>We Are Back </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Sorry for keeping you wait with out any updates on the hacks. So From now there will be daily updates on this blog.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
We are accepting guest posting on our blog. If any one interested in sharing information about hacking,then they can post info.&lt;br /&gt;
&lt;br /&gt;
For submitting hacks mail me @ 13downloads@gmail.com&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/9079552619777728243/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://theethicalhackerz.blogspot.com/2012/10/we-are-back.html#comment-form' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/9079552619777728243'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/9079552619777728243'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/2012/10/we-are-back.html' title='We Are Back '/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5808530752200142057.post-9083188188791652318</id><published>2012-09-29T11:26:00.002-07:00</published><updated>2012-09-29T11:28:33.868-07:00</updated><title type='text'>Encrypt Your Files With Secure USB</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b&gt;Encrypt Your Files With Secure USB&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Recently i found an application which encrypts and decrypts file and folders . Actually it is the tool which is used for encryption of USB&#39;s but it also encrypts iles and folders too.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7yfiwhejdtUFAhc-486ca0tHRBirkUcxXht4UNo17P9YHXvbRhB84bhlH68ar2r1HATjsOVIMiuRJ-GDPwUBIUiRYppn_9RCDqY1pIfyRAbdIrJTeedvC10LRnTcgR5UjMs3kk9FmOpk/s1600/secureusb.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7yfiwhejdtUFAhc-486ca0tHRBirkUcxXht4UNo17P9YHXvbRhB84bhlH68ar2r1HATjsOVIMiuRJ-GDPwUBIUiRYppn_9RCDqY1pIfyRAbdIrJTeedvC10LRnTcgR5UjMs3kk9FmOpk/s1600/secureusb.PNG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Secure-USB is an easy-to-use portable file encryption software.&lt;br /&gt;
It implements strong 256-bit AES encryption to encrypt data.&lt;br /&gt;
&lt;br /&gt;
It uses users hashed password as key to encrypt &amp;amp; decrypt data,&lt;br /&gt;
so it is strictly adviced to decrypt all files before changing password.&lt;br /&gt;
&lt;br /&gt;
Secure-USB runs on Windows XP/2003/Vista/7 or above.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Requirement: .NET Framework 2.0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Features:&lt;br /&gt;
&amp;nbsp;• Portable.&lt;br /&gt;
&amp;nbsp;• Intuitive &amp;amp; easy-to-use interface.&lt;br /&gt;
&amp;nbsp;• Implements 256-bit AES (Rijndael) to encrypt files. &lt;br /&gt;
&amp;nbsp;• Effective password protection.&lt;br /&gt;
&amp;nbsp;• Removing or uninstalling will not uncover encrypted files.&lt;br /&gt;
&amp;nbsp;• Fully compatible with Windows XP, 2003, Vista, 7 (32 &amp;amp; 64-bit)&lt;br /&gt;
&lt;br /&gt;
Home page:http://securefolder.tk&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://sourceforge.net/projects/secureusb/&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;Download &lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://theethicalhackerz.blogspot.com/feeds/9083188188791652318/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://theethicalhackerz.blogspot.com/2012/09/encrypt-your-files-with-secure-usb.html#comment-form' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/9083188188791652318'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5808530752200142057/posts/default/9083188188791652318'/><link rel='alternate' type='text/html' href='http://theethicalhackerz.blogspot.com/2012/09/encrypt-your-files-with-secure-usb.html' title='Encrypt Your Files With Secure USB'/><author><name>admin</name><uri>http://www.blogger.com/profile/05193666801001374702</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7yfiwhejdtUFAhc-486ca0tHRBirkUcxXht4UNo17P9YHXvbRhB84bhlH68ar2r1HATjsOVIMiuRJ-GDPwUBIUiRYppn_9RCDqY1pIfyRAbdIrJTeedvC10LRnTcgR5UjMs3kk9FmOpk/s72-c/secureusb.PNG" height="72" width="72"/><thr:total>4</thr:total></entry></feed>