Powered By Blogger

Wednesday, November 7, 2012

Jackass 3 Movie Rapidshare

Johnny Knoxville and company return for the third installment of their TV show spin-off, where dangerous stunts and explicit public displays rule.

Snapshots:






                                                            Download Links
                                                              http://www.google.co.in






Wednesday, March 16, 2011

Where should I learn ???

There are numerous facets in the world of hacking that can be VERY overwhelming to a beginner. So many that you will always learn something new until you stop hacking. There is always something new coming out that either replaces or patches(fixes) an older version of software. Therefore necessitating the need for new methods of hacking. So here is a list of programs you should download, tools you should utilize, lessons you should learn, and why you should learn them. Starting with the basics:


Google
Google is hands down the most powerful and accurate search engine. Before creating a new thread with a simple question(nothing wrong with asking us) search for it on Google.

Wikipedia
Wikipedia is a great site for information. It is not a dictionary but an encyclopedia openly update/changed by the public. So you don't have to worry about read some cryptic definition that leaves you with more questions. Nine out of Ten when you search with Google you will see Wiki at the top or close to.

Hack Forum Search
If there is a new hacking tool you just download and you want to learn more about it and how to use it. Search the HF for it, there is nothing that you as a beginner know.

Youtube
Many rules have changed ever since Google bought Youtube in 2006.
More explicit and sensitive videos are allowed more and more than the prevailing years of 2006.
You can search for practically any video dealing with hack tools and attacks.


Batch
Spirit Elementary
You simply can not get more simple than .bat files. Batch files are a good way to introduce yourself to CMD Prompt( to get to: Start>Run: tpye "cmd" enter) However batch files are commonly made with notepad. You can create simple or intricate virus .bat files that cause all sorts of chaos. You can find all kinds of virals at the Batch ,Shell, Dos and Command Line Interpreters


Cain & Abel
Youtube TuT
"Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols."


Ophcrack
Youtube TuT
Unlike Cain and Abel this program can be burned to a CD or configured to a USB to boot from. Meaning that you can have no password access to any computer profile and still crack the password. As far as i know, Cain and Abel can only function if you have access to at least a guest account.


Telnet Hacking
Telnet Hack
(Turn on Windows Vista Telnet)
Youtube TuT
"Telnet is protocol that runs over TCP/IP, and was used for connecting to remote computers. It provides a login interface, and you can run command-line programs by typing the commands on your keyboard, and the programs use the resources of the remote machine. The results are displayed in the terminal window on your machine, but the memory and CPU cycles consumed by the program are located on the remote machine. Therefore, telnet functions as a terminal emulation program, emulating a terminal on the remote machine. "



Aradamax 2.8
VicSpy
Youtube Examples
Keylogging is a method used for gathering information from your victims computer by recording keystrokes, Screenshots, and other activities. It is hard to find Keylogging tools that are completely undetectable to security programs. The few that are undetectable soon are added to security information databases. This reiterates what i said in the beginning, "There is always something new coming out that either replaces or patches(fixes) an older version of software. Therefore necessitating the need for new methods of hacking."


Basic Nmap Usage
Nmap
Youtube TuT
"Nmap ("Network Mapper") is a free and open source (license) utility for network exploration or security auditing." Basically tells you everything you need to know about your targets potential vulnerabilities. Very powerful and needed tool.


This is what I believe a new comer should start with. Many people have different ways of training that work just as well. However, this is the basics of the basics. Become well briefed in all these categories because they are the most used tools for a hacker using the Windows OS. Now you can delve deeper into the world of hacking. Don't forget, "Do not learn to hack, but hack to learn".

The absolute basics of Hacking

Intro



Recommended Tools

Port Scanner - nmap - http://nmap.org/
Browser - FireFox - http://firefox.com/




Common Web-Script Vulnerabilities
Description
In this section, I will be writing about vulnerabilities in a webserver's server-sided code. Here are the topics I will be covering:
  • SQL Injection
  • XSS (Cross-Site Scripting)
  • RFI/LFI (Remote/Local File Include)
Hello and welcome to this tutorial. If you see all the text on this page, and are afraid, you're not meant to be a hacker, quit now. Also, please know now that unlike in the movies, not everything is hackable. I will be writing about the basics of hacking servers; I will cover how to scan and/or exploit vulnerable daemons (services) running on the target server, and how to discover and/or exploit web-script vulnerabilities. You will need to know your way around a computer before reading this. And if you don't know what a word means, Google or Wiki it!; if you don't understand aconcept, post here and I will try to clarify. Thanks for reading, hope this helps.

A simple Introduction to hacking


Hacking
When anyone hears this word, a sudden thought strikes in the mind..... 'stealing important data.'. And a hacker is the thief who breaks down into systems and carries on his dirty work.

But thats not it what u really think.

"'Hacking is an art of making maximum use of computer and its resources and the person who has an immense knowledge in that is a hacker'".

So... what are those people who get under the hoods and take out their wicked ways?
They are called crackers or Black Hat hackers.

Both the people are same but their intensions are different.




Thursday, May 31, 2007

Hi

Hello World !

May be soon you will come to what I said.