How to hack a website ? A very common question and the answer is very long because it takes so many steps to hack into a website but the main and important step is to find the appropriate vulnerability, if you have the right vulnerability then it is easy to exploit the vulnerability to hack into a website or network. There are so many vulnerability tools like w3af, OWASP-ZAP, Nikto and other for web application. Arachni is one them.
Archive for January 2012
When asked for their view on Internet monitoring software, organizations typically give one of two answers. Some will say that Internet monitoring software is needed because otherwise employees will abuse their Internet privileges and waste a lot of time online instead of working. Others will tell you that privacy is sacred and Internet monitoring software may be seen as abusive and as an infringement on employee privacy.
By Ethical HackingPosted in: BackTrack, Hacking, Linux, SQL, Tutorial, Vulnerability, Web Security, XSS
Web application hacking is very common and there are so many tools that can exploit the web application vulnerabilities like SQL injection, XSS, RFI, LFI and others. The vary first step is to find the vulnerabilities on web application. Arachni is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications. So in this article I will show you how to get and install arachni and how to launch your first attack against a web application.
Wikipedia is black out, reddit is black out, wordpress is black out. SOPA will affect Facebook, Twitter, Google, Youtube and others but what is SOPA and how it will affect. Wikipedia is blackout now from where I will get the information about SOFA ? This is what imagine world without free knowledge. There are so many bloggers has written so much stuff on SOPA and PIPA but we just want to share a infographic about SOFA and I hope you will like it.
Reaver performs a brute force attack against an access point's WiFi Protected Setup pin number. Once the WPS pin is found, the WPA PSK can be recovered and alternately the AP's wireless settings can be reconfigured. While Reaver does not support reconfiguring the AP, this can be accomplished with wpa_supplicant once the WPS pin is known.
Microsoft is finally up with the latest version of internet explorer – IE8. So if you are still to check your website compatibility over the same, be prepared for some kind of wicked surprises. Every version of IE when hit the market didn’t conform to the web standards, which often poses cross browser compatibility issues to the web designers. The present IE is pretty complaint in terms of compatibility benchmarks, but since many of the websites were developed using the CSS ‘hacks’ for the earlier versions.
By Ethical HackingPosted in: BackTrack, Cracking, Hacking, Linux, Netcat, Nmap, Tutorial, Vulnerability, Web Security
Hacking, cracking and penetration testing are the hot topics of this blog and we have discussed different tutorials based on backtrack Linux specially backtrack 5 R1 because it is the newest one, however there are many video tutorials of backtrack Linux available that has been made on previous version of backtrack like backtrack 4 and others. The main aim and idea is same means to educate people how to do a penetration testing. Offensive security.
This FREE tool was designed to get a user to enter an individual website or load a text file containing many URLs at once. Once the URL(s) have been entered, the uberharvest application crawl through the website (and all the links within that website) searching for valid email addresses. The application can search for email addresses randomly (i.e. email@example.com or the user can chose to search for email addresses for a specific domain (i.e. for www.ubersec.com the application can search for all @ubersec.com email addresses within the website).
Forums are the best way to discuss any topic from marketing to hacking that is why I have decided to maintain a third party forum for the discussion of IT security and ethical hacking. So many peoples used to ask questions via contact us form and this is not a good way to ask these question and there is a need to maintain a forum so that people can ask the questions. Although we are running different discussion on our Facebook fan page and group but fan page is not for this purpose.
By Ethical HackingPosted in: Cracking, EH Security, Hacking, Linux, News, Review, Tutorial, Windows