Friday, 31 July 2015

How to Hack Like Mr. Robot | Rahul Tyagi

0 comments

Image Source: Wikipedia
"Mr. Robot is an American cyberpunk–thriller drama television series created by Sam Esmail. The series began airing on USA Network on June 24, 2015, following the May 27, 2015, premiere of the pilot on multiple online and VOD services. Prior to the series premiere it was announced that the series had been renewed for a second season" - Wikipedia

The best part about this TV series is that its not shit like Hollywood's BlackHat Movie or Indian Movies like Micky Virus.(Was Shit Movie). The ways the hacker is using in this TV series is very close to real hacking.

Episode 4 : Hacking with Raspberry Pi like Mr. Robot 

Saturday, 25 July 2015

How to Bypass Mod Security WAF | Rahul Tyagi

0 comments
Introduction to Web Application Firewall and IDS and IPS
-------------------------------------------------------
Web Application Firewall : When a web site owner deploy a application software containing all kind of attack database in it and filter the request deployed by the vistor , then we can say that the application which is deployed on the website is web application firewall.

Types of WAF
------------
Software WAF: These are the firewall technologies which are just like a software application can be installed on the web server and hence can be used to filter the requested contents.

Linux   :  Mod Security : Free | Paid :.php
Windows :  Dot Defender  : Paid :. asp aspx

Mod Security : Mod Security comes to picture in early 2008 when hackers are on the peak and defacing websites all over the world. This was era when there are many paid firewalls but there was no solution for the middle level organizations.

Union Based SQL Injection on DVWA | Rahul Tyagi

0 comments
Advance SQL Injection on DVWA
Union Based injection is a part of Injections after Bypass authentication when you can not hack any website via front end other words admin login page then we try to attack the database of the website in such a way so that we can reach the username and password of the website and later those username and password can be used for the login purpose.
Database--> tables ---> Columns --> Data
Step 1: Find a GET method in any URL of the website.
http://127.0.0.1/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit#
GET Method : .php?id=10   | Length is Dynamic
Post Method :.php    | Fixed Length

Thursday, 9 July 2015

How to Root any Android Mobile

1 comments
Every one wants to know how to Root their Android device so today in this article we will talk about best solution for rooting any android phone.

First Method of Rooting for Lazy People
There is one application for Rooting your android device via a single APK known as KingRoot, its the most easiest method on 
the planet to root your  Android Device.
Image Source: www.kingsoft.net
                     Download KingRoot : Download

Method II
---------
Rooting with KingoAndroid Root Application
Kingo Android Root offers every Android user the easiest one-click method to root any Android devices.

How to get some one's IP address while chatting on Skype

0 comments
Skype IP Resolver Pro Version 1.0
Cyber crime is raising its bar like anything, if you are chatting with some one on Skype you may be not knowing his/her exact location form where he/she is. Also many hackers remotely able to know your IP and with respect to any exploit.

Lets take a scenario their is a criminal and we do not know his location bcz he always comes online on skype talks and etc etc.

So today we will learn how you can get the current IP address of the person(Criminal) whom we are talking to trap.

Wednesday, 8 July 2015

Free online WPA Cracker | Rahul Tyagi

0 comments
Online WPA Cracker
Lets talk about today WPA cracking. I know most of you know how to crack WPA encryption. So i am considering that before reading this post you already know how to crack WEP and WPA with aircrack. 

Hope you all know that we cannot crack WPA in the same way like WEP hence we have to go for handshaking via aircrack and then brute force with any dictionary most of us use Rockyou Dictionary inbuilt in Kali Linux.

Rockyou dictionary is having size of 142MB which is awesum but some times the password which we are looking for may be not available their. hence today we will go for a new way of extracting password from WPA handshake.

Tuesday, 7 July 2015

How to prevent sql injection and make a secure login page in php

0 comments
Secure Login Page in PHP
There were quite a few people who made instructional exercises to make a PHP Login Page Secure. Be that as it may, they were all powerless against MySQL Injection. In this post I'm going to exhibit a login framework which is easy to code and strong like anything against SQL Injections. 

As i said it is exceptionally secure. There are mysqli and PDO in PHP to get away from these infusions. We are going to utilize PDO ( PHP Data Object ) in our example.

We have to make following pages to perform our exercise.

1. login.php    2.home.php    3.logout.php

Before making these above pages let us make our table in database.
AD DESCRIPTION AD DESCRIPTION AD DESCRIPTION AD DESCRIPTION