hackonce
learn hacking online at hackonce
Wednesday, 15 July 2015
Friday, 22 August 2014
Hack windows 7 with Metaspoit using kali linux
Exploiting a windows vulnerability to logging into the
system without username and password using Metasploit.
Requirements:
1. MetaSploit Installed (Kali Linux Distribution)
2. Ruby Installed (Install all the package of Ruby to
avoid any issues)
3. Two OS running either on same as virtual or physically
different
Machine 1: Host Kali Linux Machine
Machine 2: Target Windows 7 Machine (32 bit).
To lounch metasploit,
enter msfconsole at command line
#msfconsole
Now once you get the
msf prompt type the below command and look for the module
exploit/windows/browser/ms10_046_shortcut_icon_dllloader.
Thursday, 31 July 2014
data hiding behind image (steganography)
Steganography is a method of hiding data in another message so that the very existence of the data is concealed . Steganography is mainly used by hiding message in graphic images .The least significant bit of each byte of the image can be replaced with bits of the secret message .
lets see how can be hide message behind the image.
required > one secret message txt file and main image file
* put the secret.txt and main.jpg on the desktop
* open cmd (command prompt)
* type "cd Desktop" (withot quetetion)
* type again "copy /b main.jpg + secret.txt steg.jpg
lets see how can be hide message behind the image.
required > one secret message txt file and main image file
* put the secret.txt and main.jpg on the desktop
this is secret message name as secret.txt file and another is image file behind which secret message are to hide in my case i am using the image file name as main.jpg
* open cmd (command prompt)
* type "cd Desktop" (withot quetetion)
* type again "copy /b main.jpg + secret.txt steg.jpg
Tuesday, 15 July 2014
Hide data using NTFS stream.
NTFS file system in windows allows you to store data behind a file name with the use of a stream name it's not detectable browsing the file system any where within windows . It can be access it with secret key which are name of the stream
NTFS file system stream contain the data that is written to a file .
Saturday, 14 June 2014
DNS HACKING
>> DNS HACKING <<
1 DNS BASICS
2 RESOURCE RECORDS AND THE ZONE FILE
3 DNS LOOKUP AND REVERSE DNS LOOKUP
4 DNS ZONE TRANSFER
5 WHY SECURITY ISSUE OF ZONE TRANSFERING
6 CONCLUSION
1 Dns Basics:- DNS converts human readable domain names into IP-addresses. This is because domain names are much easier to remember than IP-addresses. This process may take place through a local cache or through a zone file that is present on the server. A zone file is a file on the server that contains entries for different Resource Records (RR).
This process can be understand by this example let’s assume that you write in URL bar of browser “www.google.com” the this query first goes to DNS server their resolve the site name in Ip address and then goes to query for web page of google com to web. server.
It’s not easy task to remember every IP address of various web site. so there DNS resolver work to resolve website name into IP address .
Ex. (Generally all people stored phone no. by particular person’s name ) .
Wednesday, 30 April 2014
Bypass Age Restrictions On YouTube Videos.
you want to watch video ever on youtube but couldn't becuase it is age restricted and may be you have no account . so this article will teach you how to bypass restriction on youtube.
here url is http://www.youtube.com/watch?v=MlPH_ycy62s
from here replace watch?v= by v/ and press enter
you have done it
enjoy yourself :)
Subscribe to:
Posts (Atom)