tag:blogger.com,1999:blog-83752450788732945522024-02-19T09:33:34.659+05:30Girish KumarTechnology BlogUnknownnoreply@blogger.comBlogger11125tag:blogger.com,1999:blog-8375245078873294552.post-29491899072710788102020-08-11T17:28:00.000+05:302020-08-30T16:31:15.967+05:30Android Application testing with Android Emulator and Burp Suite - Basic TutorialAfter getting some requests over social media and Youtube comments regarding Android app testing, I decided to make this simple and very basic Android app testing videoThis tutorial is for educational purpose only.This is a very basic video in which I have tried to explain how you can start with an Android application testing with Android Emulator and Burp Suite.There are many other things Unknownnoreply@blogger.comtag:blogger.com,1999:blog-8375245078873294552.post-84572968644994084112020-08-11T17:14:00.006+05:302021-11-17T20:05:37.284+05:30Chingari Application Authorization Issue (iOS and Android) - Complete User Account Takeover without Username and Password Chingari App (TikTok clone app) is made in India by Indian developers. I saw many posts over social media and many articles over Internet. All Indian people were sharing them like anything. After few days I read the news, one hacker claimed that Chingari Developer's website is compromised and has a malicious file uploaded. Later, Chingari team clarified that their website has nothing Unknownnoreply@blogger.comtag:blogger.com,1999:blog-8375245078873294552.post-91867652204974506822018-12-05T00:08:00.002+05:302020-08-30T16:31:22.171+05:30Access locked files in Secure Gallery android application without passwordHere is the video on how to access locked file in Secure Gallery Android application without password.
If you want yo retrieve the password if Secure Gallery app from the application backup then here is the video: https://www.girishkumar.net/2018/12/hacking-android-secure-gallery-app.html
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-8375245078873294552.post-80507302254098597532018-12-05T00:06:00.001+05:302021-04-11T14:43:32.759+05:30Retrieving Android Secure Gallery App password from Application Backup dataHere is the video on how to Hack password from Secure Gallery Android application backup. If you want to access locked files in secure gallery application without password then watch this video: https://www.girishkumar.net/2018/12/access-locked-files-in-secure-gallery.html
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-8375245078873294552.post-72823115873224665602014-09-26T20:30:00.001+05:302020-08-21T23:36:24.248+05:30Understanding Bash Bug or Shellshock vulnerability with examples.
As you all know that Remote Code Execution vulnerability has been identified in Bourne Again Shell as known as BASH which is command line shell in Linux and Unix. This vulnerability affects version 1.14.0 to 4.3, also known as Bash Bug or Shellshock.
CVE is available here for this vulnerability CVE-2014-6271.
So far many websites have released the news about this vulnerability, however I Unknownnoreply@blogger.comtag:blogger.com,1999:blog-8375245078873294552.post-100195051435118332014-09-07T01:26:00.004+05:302020-08-11T20:56:33.346+05:30Account Safety: Make all your passwords strong which you can remember easily.
Friends as you all know that Hacking activities are increasing rapidly day by day. You might have heard that recently hackers hacked into iCloud accounts of celebrities and leaked their personal and nude photos. So it's time to make all your account passwords strong. Most of people set their password as Boy friend name or girl friend name, Mobile number, Vehicle number, Birth Date etc. YourUnknownnoreply@blogger.comtag:blogger.com,1999:blog-8375245078873294552.post-40302741187605446672013-01-20T01:41:00.003+05:302013-01-20T01:58:17.812+05:30Find out name of unknown mobile number's user.
Hello friends, I am back after long time.
I was busy in some of my work, but today i got free time to write a small tutorial for you. Today I am gonna write a small tutorial which will be helpful to find name of unknown number's user which you get from Miss calls and Messages :-)
I know whenever you get any Message, Call or Miss call from unknownUnknownnoreply@blogger.comtag:blogger.com,1999:blog-8375245078873294552.post-86701676928801616062012-06-09T16:30:00.006+05:302020-08-21T23:38:00.819+05:30How to protect Web Server from execution of PHP Shells ???
Hello friends...
In previous tutorial I have given you an introduction to php.ini file in web servers. If you didn't read it then have a look at here.
So in today's tutorial I am gonna teach you that how to Secure web servers from PHP Shells !!!
Hope you know about PHP shells like b347k, r57, c99 etc...
(Or we can say that PHP shell is one type of Hacker's control panel on web servers monitor Unknownnoreply@blogger.comtag:blogger.com,1999:blog-8375245078873294552.post-64825798871169074922012-06-08T19:27:00.001+05:302020-08-10T22:19:47.302+05:30What is php.ini file ??? All about php.ini file.
Hey friends..
I am back with a new tutorial after long time....
Sorry for not posting any tutorial for a long...
But this time I wanna share couple of tutorial on website and server security.
Ohk, let me start. I hope you have heard about php.ini file or may be
you have accessed php.ini file during server hacking.
so today I am gonna let you know about php.ini file, after this tutorial I'll
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-8375245078873294552.post-33150497008947093302011-11-18T20:20:00.007+05:302014-09-12T00:11:49.494+05:30Steganography - Hide Data within data without using any software.
What is Steganography ???
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. The word steganography is of Greek origin and means "concealed writing" from the Greek words "Steganos" meaning "covered or protected", and "Graphei" Unknownnoreply@blogger.comtag:blogger.com,1999:blog-8375245078873294552.post-72294958666514343922011-11-15T14:53:00.002+05:302014-09-12T00:12:00.404+05:30Some Useful Commands for Hacker.
I know you all know all these commands,but today I ma posting this for beginners.So here let's start.
First of open command prompt,if you don't know then go to "Start > All programs > Accessories > Command prompt". Or press "Windows key + R" and "Run" will open then type "cmd" in Run window and hit enter.
Ok let me comeback to our main topic,here are some useful commands for hackers Unknownnoreply@blogger.com