Welcome, Guest! Registration RSS

Shehab Hacking And Cracking Articles

Sunday, 2019-01-20
What is root directory of web server ?

It is a specific directory on server in which the web contents are placed and can be seen by website visitors. The directories other that root may contain any sensitive data which administrator do not want visitors to see. Everything accessible by visitor on a website is  placed in root directory. The visitor can not step out of root directory.

what does ../ or ..\ (dot dot slash) mean  ?

The ..\ instructs the system to go one directory up. For example, we are at this location C:\xx\yy\zz. On typing ..\ , we would reach at C:\xx\yy.
Views: 5188 | Added by: shehab3451 | Date: 2011-12-13 | Comments (1)

If you’ve managed to get access to the newest version of the Twitter web site, also known as #NewNewTwitter, you might have noticed that the content is now on the right-hand side, which just feels unnatural. Here’s how to fix it in Chrome or Firefox.

It’s pretty simple—all you need to do is install a quick user script. Chrome users can simply click the link, but Firefox users will need to install the Greasemonkey extension first. Internet Explorer users… well, you’re out of luck.

Disclaimer: This is a simple script and shouldn’t break your browser, but if it does, it’s not my fault. If you want to uninstall the user script, you’ll want to open up Tools –> Extensions and you can disable it from there. Note: user scripts break all the time when the original site is ... Read more »
Views: 12188 | Added by: kzshantonu | Date: 2011-12-12 | Comments (0)

Ads are annoying and sometimes flashy animations and images that provide publicity for a product, service, or company. Many users find ads annoying on websites. Some ads even harm your computer by installing small programs that monitor your computer. To prevent this some users choose to block ads. With Mozilla Firefox and an add-on named Adblock Plus you can do it easily. Adblock Plus even blocks the occasional pop-up ad that gets past the Firefox built in blocker.

Adblock Plus for chrome, firefox, thunderbird can be downloaded from here

Enjoy an ad-free 'hacker-type' web browsing experience!
Views: 2970 | Added by: kzshantonu | Date: 2011-12-12 | Comments (1)

PHP Vulnerability Hunter is an advanced automated whitebox fuzz testing tool that can elicit a wide range of exploitable faults in PHP web applications. Since most of the webapplications now a days are on PHP, therefore PHP applications have been one of the major target of hackers, PHP Vulnerability scanner is the same tool that helped detect most of the web application vulnerabilities listed on the advisories page.
Views: 3377 | Added by: shehab3451 | Date: 2011-11-25 | Comments (1)

Wireless networks broadcast their packets using radio frequency or optical wavelengths. A modern laptop computer can listen in. Worse, an attacker can manufacture new packets on the fly and persuade wireless stations to accept his packets as legitimate.
The step by step procerdure in wireless hacking can be explained with help of different topics as follows:-

1) Stations and Access Points :- A wireless network interface card (adapter) is a device, called a station, providing the network physical layer over a radio link to another station.
An access point (AP) is a station that provides frame distribution service to stations associated with it.
The AP itself is typically connected by wire to a LAN. Each AP has a 0 to 32 byte long Service Set Identifier (SSID) that is also commonly called a network name. The SSID is used to segment the airwaves for usage.

2) Channels ... Read more »
Views: 3109 | Added by: shehab3451 | Date: 2011-10-17 | Comments (1)

Doxing is the process of getting information about a person by using the resources on the Internet using other skills. Doxing derived from the word "document" which in the brief that is making "Documents" on a person or company.

There are several ways to obtain personal information online. The most popular method is through a website called Pipl. Pipl allows you to search the full name, email, user name and even a phone number though. So that makes Pipl become a very useful tool for hackers.

Another source hackers can be used is through social networking site Facebook. But most hackers do not use Facebook to search for the name, they just use it to search their email address, since names are often in short or fake.

Doxing main objective is to find the email address of the target. Because, Email basically serves as a passport when registering at a website. There is personal infor ... Read more »
Views: 3518 | Added by: shehab3451 | Date: 2011-09-20 | Comments (0)

When installing USB Nokia cable driver, some users have trouble finding the right driver for cell phone type. Various output drivers in the trial, but to no avail and the phone still can not connect to the computer.

Driver Nokia Connectivity Cable Rel 6824 is perhaps appropriate to the type of your Nokia mobile phone USB. In several trials, the drive type is always compatible with any mobile phone type.

To Install are:
1. Unplug your phone and remove the cable driver and PC Suite Nokia phones are already installed on your computer through the Uninstall or also via the Control Panel -> Add Remove Programs.

2. Once the process is complete, download drivers Nokia here.

3. Install Driver has been downloaded earlier, and then re-install PC Suite.

4. Mobile Cable Install. Finish!
Views: 2804 | Added by: shehab3451 | Date: 2011-09-20 | Comments (0)

lash drive is currently a manual storage media are most effective. So do not be surprised if the flash drive is also a most effective medium for distributing viruses as well. Here's how to flash drives become immune to the virus.

1. Format the flash drive.

2. Create a folder in your flash drive, and give "autorun.inf" Name (without the quotes).

3. Go into the folder you just created and make a notepad document therein. Right click, select NEW> TEXT DOCUMENT. Give any name for the file you just created. This name will we replace with some special characters.

4. Then, we will open Character Map program that is in START> ALL PROGRAMS> ACCESORIES> SYSTEM TOOLS> CHARACTER MAP.

5. Select an existing font like Arial unicode, Unicode or Lucida Sans Unicode. Scroll down until you see the letters of the Japanese, Korean, Chinese, or other strange characters.

6. Select 4 or 5 characters that you want, then click copy.

7. R ... Read more »
Views: 3021 | Added by: shehab3451 | Date: 2011-09-20 | Comments (3)

With the click of a mouse on one computer, the screen of the laptop a few feet away flashes wildly as a flood of data flies silently across a private network cable connecting the two machines. Within a minute the laptop's file sharing password is compromised.

"The computer is having a bad day," says a reporter as he watches the effect of the attack on his machine. "Packets are coming at it so fast, the firewall doesn't know what to do."

Some hackers claim they can teach a monkey how to hack in a couple of hours. We asked two hackers, Syke and Optyx (at their request, we are using their hacking pseudonyms rather than their real names), to give us non-simian reporters a demonstration.

What we got was a sometimes-frightening view of how easily nearly anyone's computer--at home or at work, protected or not--can be cracked by a determined hacker. But we also found out that computer users can make a hacker's job m ... Read more »

Views: 2901 | Added by: shehab3451 | Date: 2011-09-20 | Comments (1)

Here is one of the most shocking news of today, One of the biggest News website Theregister.co.uk has been hacked few minutes before from Now, The website was not hacked by any traditional web application attacks like SQL Injection, Remote File Inclusion or local file inclusion, However DNS Hijacking or DNS redirection attack was used.  The website was hacked by Turkguvenligi who is also known as TG hacker and is also responsible for the major website defacements in the pasts including Microsoft, Dell and other big websites.

... Read more »
Views: 2733 | Added by: shehab3451 | Date: 2011-09-05 | Comments (2)

1 2 »