Saturday, 25 May 2013

Make Bootable Pendrive - Windows 7 Using Command Prompt by jaggikhanna

In this post we will Learn  how to make boot-able pen-drive for windows 7 using command prompt. This trick is really great and you don’t need to use any third party program or application. all the functions we will use are built in in windows 7. Follow these steps Carefully. 1.Start > (type in the search bar) cmd , Right click on cmd and run as administrator. ................................................................................................................................................................. 2. Once...

Thursday, 16 May 2013

Free hack softs - What is a RAT (remote access Trojan) - By Jaggi Khanna

                                  Title:What is a RAT (remote access Trojan) A remote access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer. RATs are usually downloaded invisibly with a user-requested program -- such as a game -- or sent as an email attachment. Once the host system is compromised, the intruder may use it to distribute RATs to other vulnerable computers and establish a botnet. Because a...

Wednesday, 8 May 2013

ALL WINDOWS AND MICROSOFT RUN Commands !

                                         ALL WINDOWS AND MICROSOFT RUN Commands ! 1. Accessibility Controls - access.cpl 2. Accessibility Wizard - accwiz 3. Add Hardware Wizard - hdwwiz.cpl 4. Add/Remove Programs - appwiz.cpl 5. Administrative Tools - control admintools 6. Automatic Updates - wuaucpl.cpl 7. Bluetooth Transfer Wizard - fsquirt 8....

Tuesday, 7 May 2013

IP ATTACKING SENARIO

              A                                                                                                                ...

WHAT IS IP ?

Short for Internet Protocol, IP is an address of a computer or other network device on a network using IP or TCP/IP. For example, the number "166.70.10.23" is an example of such an address. These addresses are similar to an addresses used on a house and is what allows data to reach the appropriate destination on a network and the Internet. There are five classes of available IP ranges: Class A, Class B, Class C, Class D and Class...

Monday, 6 May 2013

Hack WebSite's - Admin login Using Havij

Hi Friends in this Tutorial i will Tell you How to Hack Web Sites With Sql Injection tool, there are large amount of sql vulnerable sites available. Google Dorks: Google dorks are specifically query's that can reveal all the information about the specific website. I am giving you some Google dorks which you can use for finding the website vulnerable to sql injection.     addToCart.php?idProduct=     addtomylist.php?ProdId=  ...