10 Nov 2013
How to make a basic blog: For Sangeeta Ma'am
06:39
No comments
Please follow these steps to make and publish a blog in blogger
Please let me know if you want to know further customization of the blog and advance publishing etc
STEP 1: Go to http://www.blogger.com/start .It will ask you for your google account username and password, login with the right credentials.
STEP 2:Click on 'New Blog' Button:
Then give the title of the blog and Address, which will be used to access the blog. suppose you enter...
11 Apr 2013
Hcon - Innovating Security
Hey all in this tutorial i will be telling you all about Hcon family as in my last post i told about the new tool made by Hcon family, so i thought to tell you all about Hcon and their intentions and the way of working.
What Is Hcon ?
You all must have thought that what does Hcon stands for, right ?? Well i also don't know but it was named by the founder and owner MR.Ashish Mistry. His main aim behind this was to give more and more knowledge...
Hcon Security Testing Framework - v0.5 codename 'Prime' Released worldwide
Hey all its smarty out here sorry for not posting for too many days as i was busy in studies and other works, but i am again back with some really good stuffs.Hope you likeit
So, today i will be telling you all about a tool made by Hcon family whose owner MR. Ashish Mistry worked very hard for this.
You all might have heard about different security testing browsers,s/w etc. This is also security testing framework but i am telling it is very easy...
21 Mar 2013
Metasploit Live Webcam Streaming Of Victim

Its me Aitezaz Known as Soldier Of God (SOG)
You all will be enjoying ur good days !
This Tut is About Webcam hacking !
So when You are successful in compromising a Remote system and after
meterpreter session is opened , how to Watch Live Streaming Ov Victim
Webcam.
Video Link = http://www.youtube.com/watch?v=17RXTGacK...
4 Dec 2012
Introducing Practical Computer Networks: From a Hacker's Prospective Discussion 1
06:04
computer networks, Kumar Sourav, network hacking, penetration testing, Practical Computer Networks, pwnscar
No comments

Hello all,
How you been ? Its been a long time since i made any post . :) Missed me ? (kidding ).
So I said i will be making a new series of video discussions titled " Practical Computer Networks: From a Hacker's Prospective", here i am publishing first video of the series.
Well you must be knowing how much important computer networks are if you want to go for hacking or cyber security. So i thought i would help you as much as i can...
1 Dec 2012
Penetration Testing with iPhone Applications - Part 3
In third part we will make an in-depth analysis on the keychain data storage, understanding of the keychain and its security and also its weakness will help penetration testers for further attacks.
Keychain Storage
Keychain is an encrypted container (128 bit AES algorithm) and a centralized SQLite database that holds identities & passwords for multiple applications and network services, with restricted access rights. On the iPhone,...
11 Nov 2012
Penetration Testing with iPhone Applications - Part 2
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
Normal
0
false
false
false
EN-US
X-NONE
X-NONE
...
Subscribe to:
Posts (Atom)