News

Hacking Tools

Using Design Tools to Become Design Team

Minggu, 9 Oktober 2011
As designers, we can often find ourselves on a bit of an island. Whether we are working independently or at an in-house position, there are times when we are left to fill many job roles that merit an entire design team.   I recently experienced this situation at my previous job where I was a solo user experience designer at a company employing thousands of people. I had to do my own research, wireframes, prototyping, functional specs, visual design, etc. I had no t...

Mengungkap Teknik Hacking Password Facebook

Senin, 3 Oktober 2011
Dalam posting sebelumnya saya Cara hack facebook password saya memberitahu Anda tentang hacking facebook dengan phishing, Hari ini saya pikir untuk mengungkap semua metode yang digunakan untuk hack facebook password, Aku akan mengungkap 4 metode di sini: 1. Facebook Phishing2. Keylogging3. Social engineering4. Hack alamat email utama 1. Facebook phishing: Aku telah mengambil metode ini pertama karena saya pikir ini adalah metode yang paling populer / cara hacking facebook. S...

How to upload backdoor into the target site

Selasa, 19 Juli 2011
There may be constraints well after the takeover sqli bugs via the web, we just dapet access to the admin panel, be content if there fitus cmsnya upload pictures, hehehe: D barriers are just upload pictures, upload php? t     If the target CMS Joomla you can change the file can be uploaded in the media in the settings in Global Configuration tab in the system plus the php extension and then save. After that upload your shell in media management. your shell will be ...

Cara upload Backdoor ke website korban

Senin, 18 Juli 2011
Mungkin ada kendala yah setelah takeover web lewat bug sqli, kita cuma dapet akses ke panel admin, berbahagialah kalo cmsnya ada fitus upload gambar, hehehe :D kendalanya cuma upload gambar, upload php? ini gunanya tutorial ini ;) Jika cms target Joomlaanda dapat mengubah file yang dapat di upload di media pada settingan di Global Configuration di tab system tambah ekstensi php kemudian save. Setelah itu upload shell anda di media manajemen. shell anda akan berada pada...

How to Test for SQL Injection Bugs

Rabu, 22 Juni 2011
Below is a summary of steps needed for testing for SQL injection bugs   Step 1:  Understand SQL injection attack scenarios Step 2:  List high risk components and entry points Step 3:  Start testing and exploring Step 4:  Tune of test data Step 4: Tune test cases data At this point you have started executing an exploratory pass through the input variables.  During step 4 you need to concentrate on covering all entry points of each variab...
« Previous | 1 | 2 | 3 | 4 | 5 | Next » | »»»