Hacking

Hacking is an ART OF EXPLOITATION.

Friday, May 20, 2011

White hat hacker exposes NASA servers' vulnerabilities

White hat hacker exposes NASA servers' vulnerabilitiesA Romanian "white hat" hacker has claimed to have broken into a site of the National Aeronautics and Space Administration (NASA), and published a screenshot of the compromised server on his site.White hat hackers are programmers who break into computer systems for the sake of exposing security flaws, instead of exploiting them for malevolent purposes.In this case, "TinKode" hacked a file transfer protocol (FTP) server related to NASA's Earth Observation System at Goddard Space Flight Center."I...

Thursday, May 19, 2011

Private and Public IP Addresses

What are Private and Public IP AddressesInternet Protocol (IP) addresses are usually of two types: Public and Private. If you have ever wondered to know what is the difference between a public and a private IP address, then you are at the right place. In this post I will try to explain the difference between a public and a private IP addres in layman’s terms so that it becomes simple and easy to understand.What are Public IP Addresses?A public IP...

Tuesday, May 10, 2011

Surf Web Anonymously with TOR

What is TOR ?Tor-proxy is a free proxy-server service that Internet users can use to hide their IP address while surfing the Web. An IP address is a number used to identify computers on the Internet, and for reasons of safety and security, it may sometimes be desirable to hide the address.What is Vidalia ?Vidalia is a GUI (graphical user interface) implementation for Tor, It allows the user to start, stop, and view the status of Tor; monitor bandwidth...

Wednesday, May 4, 2011

How Firewall Works

If you have been using the Internet for any length of time, and especially if you work at a larger company and browse the Web while you are at work, you have probably heard the term firewall used. For example, you often hear people in companies say things like, "I can't use that site because they won't let it through the firewall."How Firewall Works ?Firewalls are basically a barrier between your computer and the internet. A firewall can be simply...

How to Surf web Anonymously with Proxies

Are you looking to surf the Internet without anyone knowing your location or details? Do you want to regain access to a banned website or forum? Well you’ve come to the right place as in this article I will answer the frequently asked question, How to Surf the Web Anonymously? , How to access restricted websites?There are many ways to surf the web anonymously. But the best way to surf the web Anonymously without spending a single penny is by using...

Monday, May 2, 2011

RFI(Remote File Inclusion)

Remote File Inclusion Remote File Inclusion ( RFI ) allows the attacker to upload his file on a website server using a script. Remote File Inclusion is a common vulnerability found in many websites. Using RFI you can literally deface the websites, get access to the server. Here i am going to describe this. Searching the Vulnerability:Remote File inclusion vulnerability is usually occured in those sites which have a navigation similar to this: www.anywebsite.com/index.php?page=something If you want to find more website like this try...

Google Hacking

Google hacking doesn't mean to hack Google. Google hacking term used when a hacker tries to find vulnerable targets or sensitive data by using the Google search engine.In Google hacking hackers use search engine commands to locate sensitive data and vulnerable devices on the Internet. Google supports a multitude of operators and modifiers that add a ton of power to google searchingI am going to explain some operators used in Google hackingintitle:Syntax: intitle:operator This will return all the pages that have word entered after the intitle (as...

Block any Website on your computer without any software

There are many people who want some website inaccessible from their computer. Most of the parents want to block some websites on their computer system. Here i am going to write a well known an easy way to do this.Steps:1. go to C:\WINDOWS\system32\drivers\etc2. Find a file named "HOSTS"3. Open this file in notepad4. Under "127.0.0.1 localhost" Add 127.0.0.2 www.xyz.com , Now www.xyz.com site will no longer be accessible. You can add as many url of websites under this by increasing last no. of ip as 127.0.0.3 www.abcxyz.com127.0.0.4 www.xyzas.com...