Join facebook group THE HACKER DEVIL
List Of Best Spywares For You
Yes world's best spyware tools list for all readers of DEVIL'S BLOG ON SECURITY. Please note that all views mentioned here are my personal views about those tools and has nothing to do with anyone's review. Views mentioned here are 100% my personal view about those spywares
What Is Spyware
What is spyware? A spyware is a piece of malicious code or program installed in system to monitor activities of a person. A spyware is capable of logging key strokes, it can take screen shots and if there is active Internet connection then it can even mail logs to specified email-address or transfer logs to ftp server.
How To Hack Facebook Account | The Web Browser Attack
In this following post I ll discus with you about how you can hack facebook account using tools that can attack web browser's password safe. Each web browser has feature of storing passwords, every browser first encrypts that password and then stores it in password database but the fact is that their encryption method is so weak that these tools can retrieve passwords
DDoS | Distributed Denial Of Service Attack
Distributed Denial Of Service (DDoS) Attack is large scale DoS attack conducted with help of zombie systems or botnets on vulnerable target systems. Indirectly we can say a DDoS is launched via huge network of compromised systems. DDoS attack uses many computers to launch a coordinated DoS attack against one or more target.
Bots And Botnets | The Basics
The word bot is derived from word Robot. Bots are software applications that run automated tasks over internet. Internet bots allow the host to perform click fraud, which occurs on advertising codes on websites to fraud advertisers for money. Rather than just a code a bot might be a compromised system.
From quite long I was watching an advertisement on many website about “Google Pays Me”, the advertisement usually shows a picture of a guy and a girl having check in hand along with a note “Google Pays Me”. I don't know why but I was always doubtful about it as a scam so this time when I saw it I thought to check it out by old school hacker method
DoS Attack Tools | Tools Used For Denial Of Service Attacks
In this post we will discus a little about tools that can be used for DoS attacks. Please note that tools used for DoS attacks and DDoS are different, here we will discus only those tools which are used for DoS attack not those which are used for DDoS. Most of the DoS tools are nothing but programs written by programmers,
L0phtCrack 6 | Session Management
This is last part to L0phtCrack tutorial here we will discus how to manage password cracking sessions in L0phtCrack. To set specific password cracking session click on “session options” from “Auditing”. Following window will open in front of you
DarkComet RAT | Tutorial
How To Hack Facebook Account | Phishing
In this tutorial we will discus how you can hack Facbook account password by phishing. Phishing is act of creating a replica of legitimate website for stealing passwords and credit card numbers etc. Here I will show you how you can create replica of facebook log-in page and then fool your victim to put his username and password in it so that you can get his account password
L0phtCrack | Importing And Cracking Password Hashes
Here in this post we will see how we can use L0phtCrack to crack password hashes from Windows and UNIX systems. We will see how to use L0phtCrack for dumping passwords and also how it can be used to crack already dumped files. To begin with press “import” from main menu, following window will pop out in front of you.
Next step to privilege escalation is executing commands and programs on compromised system I.e performing remote administration task. The task of executing commands and programs remotely on any system is known as remote administration. For a hacker it is quite necessary to administer remote system without installing any remote administration tool specially those which appear in process list and task manager.
Auditing Weak User Accounts On UNIX Systems
Dear visitor recently I wrote a guest post on RHA on "Auditing Weak User Accouts On UNIX Systems". Please click following link to visit RHA to read my guest post.
Denial Of Service (DoS) Attacks | The Basics
Denial of Service (DoS) attack is kind of attack in which an attacker or intruder tries to deprive system users or authorized users from accessing remote computer, network or a site. An attacker usually targets bandwidth of victim to perform this attack.