• Black Hat

    Virus On Facebook

    by  • September 3, 2008 • Amol Wagh, Ethical hacking, Exclusive, Viruses • 0 Comments

    If you receive an email from a friend titled “You’ve been catched on hidden cam, LOL: With the link (DO NOT CLICK) ttp://myvideo.d9.pl/?a=F0F 2EFE6E9ECE5AEE1EBAEE6E1E3E5E2EFEFEBAEE3EFEDAF.. F6B2B2B2AFB1B7B6B6AFB1B0B5AFF1B7B3B6B7B5B0B4B2B1DFB9B0B8B2AEEAF0E7&b=.. D4E5F2E5F3E1A0D2EFF4E9&v=07&s=fb.. It’s a virus Update your virus scanners to be protected. (AVG is Good) Happy Surfing.

    Read more →

    Vulnerability Assessment

    by  • July 31, 2008 • Black Hat, Exclusive, Tips and Tricks • 0 Comments

    Basic Terms: Vulnerability: Drawback of a system through which hackers intrude in a network and get space to try attacks on administrators. Vulnerability is also known as Security Hole. Exploit: By taking advantage of the vulnerabilities when the attack is performed is called as exploit of the vulnerability. There can be different exploit for the […]

    Read more →

    Proxies Demystified

    by  • July 30, 2008 • Amol Wagh, Ethical hacking, Exclusive, IP • 0 Comments

    Understanding the concept of proxies first need little introduction about IP Address structure. IP Address: It is assigned when you connect to internet and gives idea about where your locality can be. Means if you perform some attack on private network your geographical location can be traced quickly with the help of your IP. Proxy: […]

    Read more →

    Hiding Your Computer on the Internet

    by  • July 29, 2008 • Amol Wagh, Black Hat, Ethical hacking, Network Security, Tips and Tricks, Vista, Windows, XP • 0 Comments

    When you use internet, you are connected to millions of PC’s out there. And each PC have its own unique address known as Static IP Address. This gives your identification by locality. Without a firewall, on a typical computer, even if well maintained, a remote person will still be able to know that the communication […]

    Read more →

    Chunk 1: The Concept of Ethical Hacking

    by  • July 14, 2008 • Black Hat, Ethical hacking, Latest News, Nashik Times, Windows • 0 Comments

    Ethical Hacking Series : Chunk 1 Ethical hacking basically means preventing criminal hackers from stealing information of any personal computer r corporate network. Ethical hackers use same technology – software and tool that criminal hackers uses. But they use them for preventing crimes. Penetration testing and vulnerability assessing are the basic types of test ethical […]

    Read more →

    How To Download Unlimited On Rapidshare

    by  • June 1, 2008 • Amol Wagh, Black Hat, Ethical hacking, Rapidshare, Tutorials • 3 Comments

    Rapidshare server security can be fooled with this tutorial. Its very easy to fool Rapid Share server if your IP address is assigned by your ISP. Just follow these simple steps: clean up IE or netscape cookie( In this case the one that belong to rapidshare website) On Command prompt type —–> ipconfig /flushdns <—Enter […]

    Read more →