How to hack hi5 account



Phishing is the most commonly used method to hack hi5. The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites like Yahoo, Gmail, MySpace etc. The victim is fooled to believe the fake hi5 page to be the real one and enter...

Read More Add your Comment 0 comments


The ARP poisoning attack



The concept behind this is simple. ARP is the protocol that maintains network devices tables up-to-date by associating an IP address with a MAC address. The problem with ARP is that it doesn’t really care about who answered, it will gladly update the tables from whoever says so. Most of the time, it won’t even...

Read More Add your Comment 0 comments


How to hack twitter accounts - Phishing



First of all download:Twitter fake login page Step 1 First extract the contents into a folder Step 2 Then edit login.php .(right click and then select edit) In that ,find (CTRL+F) 'http://eblasterhacking.blogspot.com' then change it to your destined URL but don't forget '\'. Now rename the script to pass.php and save it Step 3 Now open twitter fake page in wordpad and seach for the term action=,Change action=pass.php Step...

Read More Add your Comment 1 comments


Moving on



When you’ve finished your ethical hacking tests, you still need to implement your analysis and recommendations to make sure your systems are secure. New security vulnerabilities continually appear. Information systems constantly change and become more complex. New hacker exploits and security vulnerabilities are regularly uncovered. You may discover new ones! Security tests are a snapshot of the security posture of your systems....

Read More Add your Comment 0 comments


Evaluating results



Assess your results to see what you uncovered, assuming that the vulnerabilities haven’t been made obvious before now. This is where knowledge counts. Evaluating the results and correlating the specific vulnerabilities discovered is a skill that gets better with experience. You’ll end up knowing your systems as well as anyone else. This makes the evaluation process much simpler moving forward. Submit a formal report to upper management...

Read More Add your Comment 0 comments


Executing the plan



Ethical hacking can take persistence. Time and patience are important. Be careful when you’re performing your ethical hacking tests. A hacker in your network or a seemingly benign employee looking over your shoulder may watch what’s going on. This person could use this information against you. It’s not practical to make sure that no hackers are on your systems before you start. Just make sure you keep everything as quiet and private...

Read More Add your Comment 0 comments


Selecting tools



As with any project, if you don’t have the right tools for ethical hacking, accomplishing the task effectively is difficult. Having said that, just because you use the right tools doesn’t mean that you will discover all vulnerabilities. Know the personal and technical limitations. Many security-assessment tools generate false positives and negatives (incorrectly identifying vulnerabilities). Others may miss vulnerabilities. If...

Read More Add your Comment 0 comments


Formulating your plan



Approval for ethical hacking is essential. Make what you’re doing known and visible — at least to the decision makers. Obtaining sponsorship of the project is the first step. This could be your manager, an executive, a customer, or even yourself if you’re the boss. You need someone to back you up and sign off on your plan. Otherwise, your testing may be called off unexpectedly if someone claims they never authorized you to perform...

Read More Add your Comment 0 comments


Operating-system attacks



Hacking operating systems (OSs) is a preferred method of the bad guys. OSs comprise a large portion of hacker attacks simply because every computer has one and so many well-known exploits can be used against them. Occasionally, some operating systems that are more secure out of the box — such as Novell NetWare and the flavors of BSD UNIX — are attacked, and vulnerabilities turn up. But hackers prefer attacking operating systems...

Read More Add your Comment 0 comments


Network-infrastructure attacks



Hacker attacks against network infrastructures can be easy, because many networks can be reached from anywhere in the world via the Internet. Here are some examples of network-infrastructure attacks: Connecting into a network through a rogue modem attached to a computer behind a firewall Exploiting weaknesses in network transport mechanisms, such as TCP/IP and NetBIOS Flooding a network with too many requests, creating a...

Read More Add your Comment 0 comments


Building the Foundation for Ethical Hacking



Your overall goals as an ethical hacker should be as follows: Hack your systems in a nondestructive fashion. Enumerate vulnerabilities and, if necessary, prove to upper management that vulnerabilities exist. Apply results to remove vulnerabilities and better secure your syste...

Read More Add your Comment 0 comments


Ethical Hacking



Ethical hacking — also known as penetration testing or white-hat hacking — involves the same tools, tricks, and techniques that hackers use, but with one major difference: Ethical hacking is legal. Ethical hacking is performed with the target’s permission. The intent of ethical hacking is to discover vulnerabilities from a hacker’s viewpoint so systems can be better secured. It’s part of an overall information risk management...

Read More Add your Comment 0 comments


Pages (4)1234 Next
 

Categories

OWNER

ISLAMABAD, PAKISTAN, Pakistan
BASICS OF HACKING

© 2010 CAIN & ABLE All Rights Reserved Blogger Template by FAIZAN