Friday, 17 February 2012

Cain and Abel Password Cracking Tool

1 comments
Cain and Abel (often abbreviated to Cain) is a password recovery tool for Microsoft Windows. It can recover many kinds of passwords using methods such as network packet sniffing, cracking various password hashes by using methods such as dictionary attacks,...

Thursday, 16 February 2012

Wireshark - Packet Analyzer

0 comments
Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education.Wireshark is cross-platform, using the GTK+ widget toolkit to implement its user interface, and using pcap to capture packets. It runs...

Hijack websessions with Firesheep

0 comments
Firesheep is a Firefox extension used to hijack web sessions usuall used over WiFi networks. Firesheep doesn't steal usernames and passwords. Instead it copies session cookies used on authentication websites. These are then used to impersonate the hijack connection.When logging into a website you usually...

SQL Injection

0 comments
SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded...

XSS Attack - Cross Site Scripting

0 comments
Cross-Site Scripting (XSS) is a type of computer security vulnerability typically found in web applications that enables malicious attackers to inject client side script into web pages viewed by other users. An exploited cross site scripting vulnerability...

Browser Crusher , arrrrrrr Or Denial of Service - DoS - Vulnerability

0 comments
A Denial of Service Attack (DoS Attack) or Distributed Denial of Service Attack (DDoS Attack) is an attempt to make a computer resource unavailable to its intended users. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment...

#RefRef - Denial of Service (DDoS) tool developed by Anonymous released

1 comments
#RefRef#RefRef was programmed in:- Perl- Python- JavascriptSecond Attack to test the aplication - #RefRef executed in Perl - Anonymous#RefRef programmed in Perl:#!usr/bin/perl#RefRef (C) Anonymous 2011use LWP::UserAgent;my $nave = LWP::UserAgent->new;$nave->agent("Mozilla/5.0 (Windows; U; Windows...

FreeFloat FTP Server ACCL Buffer Overflow Exploit

0 comments
#!/usr/bin/python##[+]Exploit Title: FreeFloat FTP Server ACCL Buffer Overflow Exploit#[+]Date: 01\0602\2012#[+]Author: mortis#[+]Software Link: here#[+]Version: 1.00#[+]Tested On: Windows XP SP3 English#[+]CVE: N/A#from socket import *import sys,...

Email and SMS Bombs

0 comments
An Email Bomb is a form of net abuse consisting of sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted in a Denial of Service AttackEmail bombingEmail bombing is characterized by abusers repeatedly sending an email...

Low Orbit Ion Cannon

0 comments
Low Orbit Ion Cannon, often abbreviated as LOIC, is an open source network stress testing application, written in C#. A JavaScript version has also been created enabling a DoS from a web browser. LOIC was initially developed by Praetox Technologies but later it was released into the public domain. LOIC...

Necro Virus Maker

0 comments
You can change the options to make the virus as u wantto fool ur friends and have fun...But be careful with the files u will builtbecause some of them are really dangerous...The virus maker is Safe!!! Not malware, no addware, not trojan... Nadda...Safe!The antivirus will detect it as virus tho because...

Shadow Batch Virus Generator

3 comments
Today is about virus , there are 2 software that i wanna share .1 - Shadow Batch Virus Generator2 - TeraBIT Virus MakerHere is the things that you gonna  to make Virus:(1). In Shadow Batch Virus Generator1. First of all download the virus maker from here3. You can use various options to make...

Building a Batch Virus

0 comments
In DOS, OS/2 and Microsoft Windows a Batch File is a text file containing a series of commands intended to be executed by the command interpreter. When a batch file is run, the shell program (usually COMMAND.COM or cmd.exe) reads the file and executes...