Pages

Banner 468 x 60px

 

Thursday, April 18

How Strangers Can Read Your Private Facebook Messages

0 comments
Here's something you probably didn't know: Facebook has a team of employees who read your private messages if they have been flagged by an automated tool. The tool searches for content that appears to violate their terms of service, namely malicious (infected) URLs or child pornography. It's imperfect, of course — that's where humans come in.If a private message is flagged, actual people will jump in and read it. If there is something that could...
Read more...

Creating Web Backdoor using Backtrack(Weevely Tutorial)

1 comments
Weevely PHP stealth web shell and backdoor is a PHP web shell that provides a telnet-like console to execute system commands and automatize administration and post-exploitation tasks. It is an essential tool for web application post exploitation, and also can be used as stealth backdoor Weevely is by defaultly available in OS like Backtrack, Backbox etc. Weevely php stealth web shell and backdoor has more than 30 modules available for post...
Read more...

Tuesday, April 16

Google Fixes Three High-Risk Flaws in Chrome OS

0 comments
Google has fixed a series of serious vulnerabilities in its Chrome OS, including three high-risk bugs that could be used for code execution on vulnerable machines. As part of its reward program, Google paid out more than $30,000 to a researcher who found three of the vulnerabilities.All of the vulnerabilities that Google fixed in Chrome OS are in the O3D plugin, an API that enables developers to create 3D applications for the Web. Three of the vulnerabilities are high-risk and the other flaw is rated a medium severity bug.Here are the vulnerabilities that Google fixed in Chrome OS 26:[227197]...
Read more...

Saturday, April 13

Burpsuite Tutorial

1 comments
Burp Suite is an integrated platform for attacking web applications. It contains all of the Burp tools with numerous interfaces between them designed to facilitate and speed up the process of attacking an application. All tools share the same robust framework for handling HTTP requests, persistence, authentication, upstream proxies, logging, alerting and extensibility. Burp Suite allows you to combine manual and automated techniques to...
Read more...

One Liner commands for windows

0 comments
Here i will be mostly working with WMIC. what is WMIC ? Windows management instrumentation command. The wmic command to me is one of the more powerful commands on windows. You can do multiple tasks with one command List of running processes in brief wmic process list brief kill a process wmic process where name="wordpad.exe" delete Determine open shares net share wmic share list brief Determine ip address ipconfig Get a new ip address ipconfig /release ipconfig /renew Disk drive information wmic diskdrive list full wmic partition list full List all patches wmic qfe List services wmic...
Read more...

NETCAT Tutorial

0 comments
Netcat is a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol. It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities. Netcat...
Read more...