недеља, 15. септембар 2013.

Facebook Phishing

Hack facebook using phishing page




STEP 1: Creating Phishing.php file:
1 Simply copy the following script and save it as phishing.php





STEP 2: Creating index.html page :

2.1 Open the Facebook login page then, Right click>View page source and paste it in notepad and save it as
index.html .
2.2 Open that index.html file with a Notepad and search (By pressing Ctrl+F) for :"action" in it and replace the highlighted part (as in the following screenshot) with phishing.php .




STEP 3: Now create a completely blank text file with name password.txt.
Now you have all the following three files with you :
1. phishing.php
2. index.html
3. password.txt



If you do not have your own web hosting account Upload file on 



Read More ->>

среда, 11. септембар 2013.

Nmap

Nmap
I think everyone has heard of this one, Nmap (Network Mapper) is a free open source utility for network exploration or security auditing. It was designed to rapidly Nmap scan large networks, although it works fine against single hosts.Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters / firewalls are in use, and dozens of other characteristics. It may be used to discover computers and services on a computer network, thus creating a "map" of the network.Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.Can be used by beginners (-sT) or by pros alike (packet_trace). A very versatile tool, once you fully understand the results.

Read More ->>

The Mole v0.3 Released For Download – Automatic SQL Injection Exploitation Tool


The Mole is an automatic SQL Injection exploitation tool. All you need to do is provide a vulnerable URL and a valid string on the site you are testing and the Mole will detect the injection and exploit it, either by using the union technique or a boolean query based technique.

We did mention the Mole when we first heard about it back in 2011 - The Mole - Automatic SQL Injection SQLi Exploitation Tool.

Download for Windows
Read More ->>

Nesus

Recently went closed source, but is still essentially free. Works with a client-server framework.Nessus is the worlds Nessus Remote Security Scanner most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the worlds largest organizations are Realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications. 
Download Nesus

Read More ->>
Омогућава Blogger.