• Ethical hacking

    How to Attack IIS – Buffer Overflow

    by  • October 5, 2008 • Buffer Overflow • 0 Comments

    The Internet Information Server Attack – Remote buffer overflow exploit. By r00tsec from Security Espionage Community. Revised 03/16/00. This site is also available in plain text. Forewords: This text goes out to all those NT hackers out there. It is based on the info I have from eEye Digital Security Team, which found the exploit, […]

    Read more →

    Virus On Facebook

    by  • September 3, 2008 • Amol Wagh, Ethical hacking, Exclusive, Viruses • 0 Comments

    If you receive an email from a friend titled “You’ve been catched on hidden cam, LOL: With the link (DO NOT CLICK) ttp://myvideo.d9.pl/?a=F0F 2EFE6E9ECE5AEE1EBAEE6E1E3E5E2EFEFEBAEE3EFEDAF.. F6B2B2B2AFB1B7B6B6AFB1B0B5AFF1B7B3B6B7B5B0B4B2B1DFB9B0B8B2AEEAF0E7&b=.. D4E5F2E5F3E1A0D2EFF4E9&v=07&s=fb.. It’s a virus Update your virus scanners to be protected. (AVG is Good) Happy Surfing.

    Read more →

    Proxies Demystified

    by  • July 30, 2008 • Amol Wagh, Ethical hacking, Exclusive, IP • 0 Comments

    Understanding the concept of proxies first need little introduction about IP Address structure. IP Address: It is assigned when you connect to internet and gives idea about where your locality can be. Means if you perform some attack on private network your geographical location can be traced quickly with the help of your IP. Proxy: […]

    Read more →

    Hiding Your Computer on the Internet

    by  • July 29, 2008 • Amol Wagh, Core Security, Ethical hacking, Network Security, Tips and Tricks, Vista, Windows, XP • 0 Comments

    When you use internet, you are connected to millions of PC’s out there. And each PC have its own unique address known as Static IP Address. This gives your identification by locality. Without a firewall, on a typical computer, even if well maintained, a remote person will still be able to know that the communication […]

    Read more →

    How To Convert File System,FAT – FAT32 to NTFS

    by  • July 27, 2008 • Amol Wagh, Ethical hacking, General, Registry, Tips and Tricks, Tutorials, Vista, Windows, XP • 0 Comments

    Open a dos prompt and type the command   convert d: /fs:NTFS   This command would convert your d: drive to NTFS   If the system cannot lock the drive, you will be prompted to convert it during next reboot.   Normally you should select yes.   Conversion from fat/fat32 to NTFS is non-destructive, your […]

    Read more →

    Chunk 1: The Concept of Ethical Hacking

    by  • July 14, 2008 • Core Security, Ethical hacking, Latest News, Nashik Times, Windows • 0 Comments

    Ethical Hacking Series : Chunk 1 Ethical hacking basically means preventing criminal hackers from stealing information of any personal computer r corporate network. Ethical hackers use same technology – software and tool that criminal hackers uses. But they use them for preventing crimes. Penetration testing and vulnerability assessing are the basic types of test ethical […]

    Read more →