• Black Hat

    Firewalk Attack: Beyond The Boundaries of Security.

    by  • March 21, 2009 • Amol Wagh, Black Hat, Ethical hacking, Exclusive, Student Series • 0 Comments

    Firewalk which was developed by two masterminds known as developed by Mike Schiffman and Dave Goldsmith furthers the techniques used both by static port traceroutes and hping. It can be successfully implemented to scan a host downstream from a security gateway to assess what rules relate to the target system, without any packets having to […]

    Read more →

    Get Rapidshare Premium Account Numbers Live

    by  • March 13, 2009 • Rapidshare • 8 Comments

    Hii All, I have some new numbers for your Rapidshare download. Here are some rapidshare premium account numbers http://rapidshare.com/files/7361432/REAL_WAY_TO_EASY_GET_A_PREMIUM_ACCOUNT_-_NO_KEYGEN.ra Download this file You can get a free generator : It generates randomly free rapidshare account numbers. All these rapidsahre numbers are premium and you’ll surely find active ones by trying 2-3 searches on it. It […]

    Read more →

    Set Up Your Own Domain Name Server

    by  • December 21, 2008 • Black Hat • 3 Comments

    This is only a quick tutorial, there are literally hundreds of little tricks you can do with a DNS, but this will get your basics up and running. I’m assuming you want to setup a windows DNS server, but the principals will work for most servers. You will need.. 1) A domain name over which […]

    Read more →

    Unlimited Rapidshare Downloads

    by  • December 21, 2008 • Rapidshare • 0 Comments

    Its very easy to fool Rapid Share server if your IP address is assigned by your ISP. Just follow these simple steps: clean up IE or netscape cookie( In this case the one that belong to rapidshare website) On Command prompt type —–> ipconfig /flushdns <—Enter type —–> ipconfig /release <—Enter type —–> ipconfig /renew […]

    Read more →

    List of All Trojans and Trojan Ports

    by  • December 21, 2008 • Trojans, Tutorials • 0 Comments

    TCP 1 Breach.2001, SocketsDeTroie.230, SocketsDeTroie.250 TCP 28 Amanda.200 TCP 31 MastersParadise.920 TCP 68 Subseven.100 TCP 142 NetTaxi.180 TCP 146 Infector.141, Intruder.100, Intruder.100 TCP 171 ATrojan.200 TCP 285 WCTrojan.100 TCP 286 WCTrojan.100 TCP 334 Backage.310 TCP 370 NeuroticKat.120, NeuroticKat.130 TCP 413 Coma.109 TCP 420 Breach.450 TCP 555 Id2001.100, PhaseZero.100, StealthSpy.100 TCP 623 Rtb666.160 TCP 660 Zaratustra.100 […]

    Read more →

    How to set up a server with Apache , PHP , MySQL , Perl , phpMyAdmin

    by  • December 21, 2008 • Black Hat, Tutorials • 0 Comments

    Let’s start by installing apache (http server) . you can download the apache installer on www.apache.org . download the verion you like , even thought , in win systems i recomand verion 2 (this tutorials is for apache 2) . here is a link for it : Code: http://apache.mirror.nedlinux.nl/dist/httpd/binaries/win32/apache_2.0.52-win32-x86-no_ssl.msi for a faster mirror , visit […]

    Read more →

    IP Spoofing Attack

    by  • November 1, 2008 • Amol Wagh, Black Hat, Ethical hacking, Exclusive, IP, Network Security • 2 Comments

    Internet Protocol i.e IP addresses are unique and used for digital data communication for internet. Any mailing system or website technology works on the same principle of digital communication. Every computer connected to Network have its unique IP address. When Person A sends an email  to person B, The mail is assigned with the header […]

    Read more →