So far i have explained about the Traditional Cross site scripting that occurs because of insecure server-side code. In this post , i am going to explain the DOM Based Cross Site Scripting vulnerability. if you don’t what cross site scripting is, then i recommend you to read the basics from here. Before explaining about […]
How to Use Ravan for Password Cracking?
In my previous article, i explained about the Ravan Tool. Now let us see how to use the Ravan for cracking passwords. Requriments: Lot of Friends : Ravan is Distributed password cracking method. So you will need lot of friends who have Pc with Internet connection. The speed of cracking will increase based on the […]
List of websites to check whether website is safe to use or not
In one of my posts, i explained how to check a website is safe or not using McAfee siteAdvisor add on. But ,checking with one site is not enough. To make sure whether site is free from malware or not, we have to verify the target-link with few more sites. Here ,i list out some […]
The Art of Human Hacking -Social Engineering(SE) tutorial series
Hello BTS readers, here we come with an interesting tutorial written by my friend Mr.Ashish Mistry who is the founder of Hcon and author of ‘HconSTF ‘ project. Hello all, after a long time I am again started writing, In a hope that my believe in “sharing the spirit of learning” fulfills well. So from […]
11 Year old Indian(Tamil) Girl Vishalini has highest IQ in the world
This post is nothing to do with our hacking topics. But this post will be interesting for you. K. Vishalini, Tirunelveli, TamilNadu, 11-year old girl ,has highest IQ in the World. She will be eligible for an entry in the Guinness only after she turns 14. Her amazing Achievements: Vishalini’s IQ is around 225. It […]
How to Fetch Username and Password by Social Engineering Technologies?
Security Researcher Ankit Sharma,from God of hackers group(GOH) presented a video tutorial which explains how to do social engineering attacks using Backtrack. Social engineering is commonly understood to mean the art of manipulating people into performing actions or divulging confidential information. While it is similar to a confidence trick or simple fraud, the term typically […]
How to do Sql injection attack with Back Track 5 using sqlmap? [Hacking video Tutorials]
Hello BTS readers, here is PenTesting video tutorial that explains how to do SQL injection with Backtrack5 using Sqlmap tool. This tutorial is submitted by Anonymous Nepal.
How to Bypass Two-Step Authentication in Facebook?
A security researcher Christopher Lowson, has found a way to bypass the security feature called Two-Factor authentication. If you login from unknown devices, Facebook will launch the Two-step authentication and asks users to enter code which is send to your phone. When Lowson try to login into Facebook , the Facebook asked him enter Login […]