Dear Readers: PWNSCAR is planning to publish a monthly Tech Magazine along with some other blogs. To Contribute CHECK DETAILS

This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

ABOUT ME

10 Nov 2013

How to make a basic blog: For Sangeeta Ma'am

Please follow these steps to make and publish a blog in blogger Please let me know if you want to know further customization of the blog and advance publishing etc STEP 1: Go to http://www.blogger.com/start .It will ask you for your google account username and password, login with the right credentials. STEP 2:Click on 'New Blog' Button: Then give the title of the blog and Address, which will be used to access the blog. suppose you enter...

11 Apr 2013

Hcon - Innovating Security

Hey all in this tutorial i will be telling you all about Hcon family as in my last post i told about the new tool made by Hcon family, so i thought to tell you all about Hcon and their intentions and the way of working. What Is Hcon ? You all must have thought that what does Hcon stands for, right ?? Well i also don't know but it was named by the founder and owner MR.Ashish Mistry. His main aim behind this was to give more and more knowledge...

Hcon Security Testing Framework - v0.5 codename 'Prime' Released worldwide

Hey all its smarty out here sorry for not posting for too many days as i was busy in studies and other works, but i am again back with some really good stuffs.Hope you likeit So, today i will be telling you all about a tool made by Hcon family whose owner MR. Ashish Mistry worked very hard for this. You all might have heard about different security testing browsers,s/w etc. This is also security testing framework but i am telling it is very easy...

21 Mar 2013

Metasploit Live Webcam Streaming Of Victim

Its me Aitezaz Known as Soldier Of God (SOG) You all will be enjoying ur good days ! This Tut is About Webcam hacking ! So when You are successful in compromising a Remote system and after meterpreter session is opened , how to Watch Live Streaming Ov Victim Webcam. Video Link = http://www.youtube.com/watch?v=17RXTGacK...

4 Dec 2012

Practical Computer Networks :Discussion 2

...

Introducing Practical Computer Networks: From a Hacker's Prospective Discussion 1

Hello all, How you been ? Its been a long time since i made any post . :) Missed me ? (kidding ). So I said i will be making a new series of video discussions titled " Practical Computer Networks: From a Hacker's Prospective", here i am publishing first video of the series. Well you must be knowing how much important computer networks are if you want to go for hacking or cyber security. So i thought i would help you as much as i can...

1 Dec 2012

Penetration Testing with iPhone Applications - Part 3

In third part we will make an in-depth analysis on the keychain data storage, understanding of the keychain and its security  and also its weakness will help penetration testers for further attacks. Keychain Storage Keychain is an encrypted container (128 bit AES algorithm) and a centralized SQLite database that holds identities & passwords for multiple applications and network services, with restricted access rights. On the iPhone,...

11 Nov 2012

Penetration Testing with iPhone Applications - Part 2

v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} w\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} Normal 0 false false false EN-US X-NONE X-NONE ...