Saturday, April 12, 2014

Tutorial about google Dorks

Dorks

They are basically as the search criteria in a search engine returns results related to your search. The process can be a bit slow , but the result will be worth after learning about the use .
Basic formula

"inurl : . " domain " / " search ","

means so broken
"inurl " = URL input
"domain" domain = example gob com gov net etc etc
" dork " = what you want espesificamente search esl main element of the rest are complements search accuracy.

How to Sniff Passwords Using USB Drive

As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to sniff passwords from any computer.

We need the following tools to create our rootkit

Friday, April 11, 2014

Send Free SMS Unlimited Worldwide & No need to register

Send unlimited free SMS messages online. No need to register, just write your message and send unlimited sms to any country you like for FREE!
No matter where you are, you will always enjoy our FREE SMS text message Service.
Check out the countries available in our list and have fun by sending free SMS to your loved ones for Free!



Steps:-

Sunday, April 6, 2014

How to Lock Drive of Remote Windows Victim PC



First Hack the Victim PC Using Metasploit Once you got the meterpreter session use ‘shell ‘command to get command prompt of the target.

Type Cacls (Drive Name) /e /p everyone:n and press Enter.This will lock your “E Drive” 



Solution For Unlock
Now right-click on your E drive –> Properties –> Click on “Security” tab click on C ContinueCheck the check box “Full Control” –> Click on OK.



Parameters
FileName   Required. Displays DACLs of specified files.
/t   Changes DACLs of specified files in the current directory and all subdirectories.
/e   Edits a DACL instead of replacing it.
/c   Continues to change DACLs, ignoring errors.
/g   User: permission   Grants access rights to the specified user. The following table lists valid values for permission.
Value
Description
n
None
r
Read
w
Write
c
Change (Write)
f
Full Control


Contact Form

Name

Email *

Message *