Saturday, July 20, 2013

Using Kon-Boot from a USB Flash Drive: Bypass those pesky Windows and Linux login passwords completely

0 comments
Kon-boot is a cool tool you can download from http://www.piotrbania.com/all/kon-boot/ that  boots from a CD or floppy and modifies memory to let you login without knowing a local account password in both Windows (even up to Windows 7 32bit SP1) and Linux (not all distros). Kon-Boot...

Friday, July 19, 2013

Tango App website/databases hacked

0 comments
The Syrian Electronic Army hacked the Tango app (video/text messages service) website and database The databases content a of millions of  the app users phone numbers and contacts and their emails More than 1,5 TB of the daily-backups of the servers network has been downloaded successfully Screenshot...

How To Create Virus Without Any Programming Knowledge

0 comments
Tool Name:- Sonic Bat Batch File Virus Maker This program creates batch (.bat) viruses and has varied options to ruin the victim computer in different ways. We can flood the storage space on victims' computer by making large number of files in different folders by using its "folder...

Thursday, July 18, 2013

Everything you need to know about PRISM

0 comments
A cheat sheet for the NSA's unprecedented surveillance programs. By T.C. Sottek and Josh Kopstein Since September 11th, 2001, the United States government has dramatically increased the ability of its intelligence agencies to collect and investigate information on both foreign subjects and...

Tuesday, July 16, 2013

Reaver 1.4- Wifi Protected Setup (WPS) Brute Forcer

0 comments
                        Reaver 1.4 - Wifi Protected Setup (WPS) Brute Forcer   An Austrian information security student and researcher Stefan Viehböck released details of a vulnerability in the WiFi Protected...

Bypass and Crypte Payload from antivirus

0 comments
Bypassing Antivirus with Msfencode (10 pts.) What You Need A BackTrack Linux machine, real or virtual. I used BackTrack 5 R2, but other versions of BackTrack are probably OK too. WARNING We are using some harmless test files, but don’t infect people with any real viruses–that’s a crime! Purpose Antivirus...