Free Hacking News Letter |
- What is Hacker Emblem? A Universal Hacker Emblem: The Glider Emblem
- Local File Inclusion Exploiter Version 1.2 Download Free
- Local File Inclusion Vulnerability Scanner version 1.0 released
- XSS - Cross Site Scripting Cheat Sheet By RSnake
- Joomla RFI Remote File Inclusions Attack | Joomla LFI Local File Inclusions Attack
- How to Hack Joomla Website? Joomla SQL Injection Example: Learn Joomla Hacking
- Fix Skype 0day Vulnerability: Patch for Mac Client Available
- UPDATE from d3hydr8: CCAvenue.com Payment Gateway Vulnerable SQL Injection
- Security Company Barracuda Networks Database Hacked by fdf (hmsec.org cr3w) via SQL Injection Attack
- SQL Injection Vulnerability Found in Travel411: Live example
- Joomla Hacking Tools: Hack Joomla with self-written tools by Valentin
- Austria Hires 1600 Soldiers for 'Cyber' Security
- Saving Passwords Storage Service Hacked
What is Hacker Emblem? A Universal Hacker Emblem: The Glider Emblem Posted: 07 May 2011 06:30 AM PDT What is Hacker Emblem? A Universal Hacker Emblem: The Glider Emblem Emblem that represents the entire hacker community The Linux folks have their penguin and the BSDers their daemon. Perl's got a camel, FSF fans have their gnu and OSI's got an open-source logo. But there is no emblem that represents the entire hacker community. This is a proposal that we adopt one — the glider pattern from the Game of Life. What will I be saying if I display it? When you put the glider emblem on your web... Do you want to read more..Visit my site @ http://www.amarjit.info |
Local File Inclusion Exploiter Version 1.2 Download Free Posted: 07 May 2011 04:55 AM PDT Local File Inclusion Exploiter Version 1.2 Download Free by Valentin Description The Simple Local File Inclusion Exploiter helps you to exploit LFI vulnerabilities. After you found one, simply pass the URL of the affected website and the vulnerable parameter to this tool. You can also use this tool to scan a parameter of an ULR for a LFI vulnerability. Usage ./lfi_sploiter.py –exploit-url= –vulnerable-parameter= Usage example ./lfi_sploiter.py... Do you want to read more..Visit my site @ http://www.amarjit.info |
Local File Inclusion Vulnerability Scanner version 1.0 released Posted: 07 May 2011 04:49 AM PDT Local File Inclusion Vulnerability Scanner version 1.0 released by Valentin DOWNLOAD HERE - (Python script) Description The Simple Local File Inclusion Vulnerability Scanner helps you to find LFI vulnerabilities. Usage ./lfi_scanner.py –url= Usage example ./lfi_scanner.py –url="http://www.example.com/page.php?file=main" Usage notes - Always use http://…. - This tool does not work with SEO URLs, such as http://www.example.com/news-about-the-internet/. - If you only have a SEO URL, try to... Do you want to read more..Visit my site @ http://www.amarjit.info |
XSS - Cross Site Scripting Cheat Sheet By RSnake Posted: 07 May 2011 05:00 AM PDT XSS - Cross Site Scripting Cheat Sheet By RSnake Note from the author: XSS is Cross Site Scripting. If you don't know how XSS (Cross Site Scripting) works, this page probably won't help you. This page is for people who already understand the basics of XSS attacks but want a deep understanding of the nuances regarding filter evasion. This page will also not show you how to mitigate XSS vectors or how to write the actual cookie/credential stealing/replay/session riding portion of the attack. It... Do you want to read more..Visit my site @ http://www.amarjit.info |
Joomla RFI Remote File Inclusions Attack | Joomla LFI Local File Inclusions Attack Posted: 07 May 2011 04:19 AM PDT Joomla LFI Local File Inclusions Attack | Joomla RFI Remote File Inclusions Attack By Valentin Examples for Joomla local file inclusions Local file inclusions are very funny. You tell the website what you want to see. Awesome! You want to view the configuration file which contains the database login credentials? No problem. You want to view the /etc/passwd file if Joomla is hosted on a Linux box? You can do that. Local file inclusions are also a common problem in Joomla extensions. Many of... Do you want to read more..Visit my site @ http://www.amarjit.info |
How to Hack Joomla Website? Joomla SQL Injection Example: Learn Joomla Hacking Posted: 07 May 2011 04:09 AM PDT How to Hack Joomla Website? Joomla SQL Injection Example Learn Joomla Hacking by Valentin The probably most common case for hacked Joomla websites is that a SQL injection vulnerability was exploited. A typical URL which is affected by this type of vulnerability looks like this: index.php?option=com_blabla&category=5&Item=2 Typically the following parameters are vulnerable: - cat, category, kat, categories, kats, cats - id, userid, katid, catid - sometimes also Item, entry, page You... Do you want to read more..Visit my site @ http://www.amarjit.info |
Fix Skype 0day Vulnerability: Patch for Mac Client Available Posted: 07 May 2011 03:55 AM PDT Fix Skype 0day vulnerability: Patch for Mac Client Available Last night we post an article Skype 0day vulnerability: Skype bug gives root access to Mac OS X: Discovered by Pure Hacking. Extremely wormable and dangerous. Mac users running Skype are vulnerable to self-propagating exploits that allow an attacker to gain unfettered system access by sending a specially manipulated attachment in an instant message. In response to it, today morning SKYPE announces that the patch was available since... Do you want to read more..Visit my site @ http://www.amarjit.info |
UPDATE from d3hydr8: CCAvenue.com Payment Gateway Vulnerable SQL Injection Posted: 07 May 2011 03:25 AM PDT UPDATE from d3hydr8: CCAvenue.com Payment Gateway Vulnerable SQL Injection Few Days back we post an article that Was CCAvenue really Hacked? Vishwas Patel, CEO Denied Continuing to that.... A fresh update has been received from the hacker d3hydr8. All details as mentioned below. Kindly disregard the previous report. I got the date all mixed up. Thanks, :) d3hydr8 From: "d3hydr8 D" Date: Sat, 7 May 2011 08:17:01 +0530 ****************************************************************** (+)... Do you want to read more..Visit my site @ http://www.amarjit.info |
Security Company Barracuda Networks Database Hacked by fdf (hmsec.org cr3w) via SQL Injection Attack Posted: 07 May 2011 03:18 AM PDT Security Company Barracuda Networks Database Hacked by fdf (hmsec.org cr3w) via SQL Injection Attack Yet another security company was embarrassed over the weekend after a hacker broke into its marketing database. Barracuda Networks, which has an impressive security portfolio that includes the Barracuda Spam & Virus Firewall, Barracuda Web Firewall, as well as VPN and Web Application Firewall appliances, saw the names and email addresses of its employees and partners splashed online. Also... Do you want to read more..Visit my site @ http://www.amarjit.info |
SQL Injection Vulnerability Found in Travel411: Live example Posted: 07 May 2011 02:55 AM PDT SQL Injection Vulnerability Found in www.travel411.com: Live example Greetz fly to Caddy-Dz ##### Exploit Title: Travel411 SQL Injection Vulnerability # Author: Caddy-Dz # Facebook Page: www.facebook.com/islam.caddy # E-mail: islam_babia@hotmail.com # Category:: webapps # Google dork: intext:"Powered by Travel411.com" # Tested on: [Windows Vista Edition Intégrale] # Vendor: http://www.travel411.com/ #### ## ExPLo!T: ||>> Find Any File Like (info.php?id=) or (reservations.php?id=) # ... Do you want to read more..Visit my site @ http://www.amarjit.info |
Joomla Hacking Tools: Hack Joomla with self-written tools by Valentin Posted: 07 May 2011 01:54 AM PDT Joomla Hacking Tools: Hack Joomla with self-written tools by Valentin Manual testing is awesome, but automated checks are faster and maybe even more reliable. Here are some self-written tools you could use for your purposes: #1 Joomla QPersonel Exploit http://www.xenuser.org/exploits/joomla_com_qpersonel_sploit.py #2 Automated Joomla SQL Injection Exploiter http://www.xenuser.org/exploits/joomla_sqli_sploiter.py #3 Joomla BF Quiz... Do you want to read more..Visit my site @ http://www.amarjit.info |
Austria Hires 1600 Soldiers for 'Cyber' Security Posted: 07 May 2011 01:06 AM PDT Austria Hires 1600 Soldiers for 'Cyber' Security Austria is not exactly known because of its military power. It is somewhat surprising that the country is apparently building a substantial cyber defense structure consisting of 1600 soldiers of its army as well as several secret service departments. If the report of the Austrian magazine News is correct, then the Austrian cyber defense will be one of the largest departments in the country's overall secret service. A confidential paper the... Do you want to read more..Visit my site @ http://www.amarjit.info |
Saving Passwords Storage Service Hacked Posted: 06 May 2011 11:59 PM PDT Saving Passwords Storage Service Hacked by Bryan Richard A general requirement in the World Wide Web which gives the users privacy is to have a password, and this protects their accounts to be confidential, and the same getting hacked with login information becomes the worst nightmare. LatePass stands as one of the popular password storing services gave a statement that they may have been hacked, and they are notifying the users to change what its marketing has been touting as the last... Do you want to read more..Visit my site @ http://www.amarjit.info |
You are subscribed to email updates from Learn How To Hack! Learn Ethical Hacking and Download Free Hacking Tools To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.