Skip to main content

Youtube

Comments

Popular posts from this blog

Hacking MySQL Online Databases with Sqlmap

In this tutorial, we will follow up on a previous tutorial on  MySQL . In that tutorial, I showed you the basics of running a MySQL server on BackTrack. In addition, you might want to take a look at my tutorial on the basics of  databases , if you are not familiar with databases and DataBase Management Systems (DBMS). Since MySQL is SO important in so many web applications, I will be doing more MySQL tutorials in the future. The more you know about MySQL, the better you can hack MySQL! Generally, MySQL is teamed up with PHP and an Apache web server (often referred to as LAMPP or XAMPP) to build dynamic, database driven web sites. Such development packages as Drupal, Joomla, Wordpress, Ruby on Rails and others all use MySQL as their default database. Millions of websites have MySQL backends and very often they are "homegrown" websites, without much attention on security. In this tutorial, we will looking to extract information about an online MySQL database before we

Mobile Hack Tricks

Encrypt your Internet. Use  Top Secure VPN  For Online Privacy Call Forging: To call someone from their own number or any number. 1. Go to  http://www.mobivox.com  and register there for free account. 2. During registration, remember to insert Victim mobile number in “Phone number” field as shown below. 3. Complete registration and confirm your email id and then login to your account. click on “Direct WebCall”. 4. You will arrive at page shown below. In “Enter a number” box, select your country and also any mobile number(you can enter yours). Now, simply hit on “Call Now” button to call your friend with his own number. 5. That’s it. Your friend will be shocked to see his own number calling him. I have spent last two days simply playing this cool mobile hack prank. Note: This trick will only knowledge purpose… Just try this trick only known person. Trace Mobile Location: Click On Below Link To Trace Unknown Number -> Trace Mobile Location

What Is a Keylogger and Key Logging Software?

A  keylogger  is a hardware device or a software program that records the real time activity of a computer user including the keyboard keys they press. Use Cases for a Keylogger Keyloggers are used in  Information Technology (IT)  organizations to troubleshoot technical problems with computers and business networks. Keyloggers can also be used by a family (or business) to monitor the network usage of people without their direct knowledge; they are sometimes used as part of home parental controls. Finally, malicious individuals may use keyloggers on public computers to steal passwords or credit card information. What Information a Keylogger Can Collect The capabilities of keyloggers vary, but when installed on a device they can generally do the following: capture any passwords entered by users on the device take screen captures of the device at periodic intervals record the  URLs  that were visited via Web browsers, and possibly also take screen captures of th