Hacking facebook on wifi LAN part 2

Im back with the second part of the post. At the end of the last post, we successfully re-routed all the traffic from the victim’s computer to the router through our computer.Next, we have to capture their facebook cookies through wireshark. So How do you go about doing that? It’s very simple actually. Open up […]

Setting Webserver- Host Webpages on your own computer

Have you ever wondered to setup a website without signing up at any web hosting site ? Learning web site designing and wanna keep testing how your web pages look? Free Web hosting sites removing you phishing     pages ? So solution to such kinda things is in this post.  Basically we are going to turn our […]

Trojan Horse | RAT | Configure and Use | Tutorial- Part 2

Just go through the Part 1 which includes the basics of  Trojan Click here. This tutorial is about configuring and using a trojan. There are many trojans available on internet for free. Some popular ones are Beast, Pro Rat, Netbus , Back Orifice, Girlfriend, Sub 7. I will be using Pro Rat in this tutorial. Requirements […]

Trojan Horse (Basics) – Part 1

Have you watched movie Troy ? okay lets leave . Have your wallpaper ever changed automatically ? Have the programs ever started without your initiation ? Have the browser opened unexpected websites automatically ? Simply have you ever felt that someone else is controlling your computer ? NO ? Congrats, you probably haven’t been a […]

Install Backtrack on any Android Device

I f I found this amazing tutorial which will let you install the easy hacking operating system for hacker i.e “BackTrack 5” on an Android Device. The most important thing was that they installed Backtrack using a VNC option. In this you don’t have to change your origina operating system and can access backtrack like […]

How to easy hack a wordpress site or blog

The answer to this question may be difficult to determine, simply because there are so many ways to hack a site. Our aim in this article to show you the techniques most used by hackers in targeting and hacking your site! Let’s suppose that this is your site: hack-test.com Let’s ping this site to get […]