Infection via HTML

January 21, 2010 0 Comments 0 tags

Edit the code on what and how you need it, and yes this is detectable  in many cases, but you could insert a small FUD downloader to be  downloaded via

Hacking PHP 4.4

January 18, 2010 0 Comments 0 tags

This tut Shows how to hack Sites running: Php 4.4 Sites. Step 1 – Search for them Yep,make a Google dork to find sites running Apache and PHP 4.4 .

phishing tutorial

January 16, 2010 0 Comments 0 tags

1.You can use this same tut for anything else… 2. Go to http://www.rapidshare.com and navigate to the premium account log-in screen at the url : https://ssl.rapidshare.com/cgi-bin/premiumzone.cgi 3. We will now

Introduction on benchmarking attacks

January 14, 2010 0 Comments 0 tags

Affected operating systems: ————————— Windows XP Pro Windows 2003 Windows Vista Windows 2008 (all service packs…) And probably some UNIX/Linux systems with some variants… Look by yourself. ================================================== ================================================== Abstract:

What is Buffer Overflows?

January 13, 2010 0 Comments 0 tags

Buffer Overflows Buffer Overflows have been around since the very beginnings of the Von-Neuman architecture. They first gained widespread notoriety in 1988 with the Morris Internet worm. Unfortunately, the same

The Null Byte Exploit

January 13, 2010 0 Comments 0 tags

Many web forums have mushroomed on internet and they are setup in a jiffy,so they wont pay much attention to security. An older exploit I m discussing here is The

Finding vulnerabilities in PHP scripts

January 11, 2010 0 Comments 0 tags

Contents : * 1) About * 2) Some stuff * 3) Remote File Inclusion * 3.0 – Basic example * 3.1 – Simple example * 3.2 – How to fix