Posts

Showing posts with the label Password hacking

How To Find Uploaded shell and Passwords By Google dorks (priv8 dorks)

How To Find Uploaded shell and Passwords By Google dorks (priv8 dorks) How To Find Uploaded shell By Google dork (priv8 dorks) Go to Google.com and type these Dorks, and you will got a Lot of uploaded shells in Google serach results !! Dorks for finding shells  inurl:.php "cURL: ON MySQL: ON MSSQL: OFF"  "Shell" filetype:php intext:"uname -a:" "EDT 2010" intitle:"intitle:r57shell" [ phpinfo ] [ php.ini ] [ cpu ] [ mem ] [ users ] [ tmp ] [ delete ] inurl:"c99.php" & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout inurl:"c100.php" & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout intitle:"Shell" inurl:".php" & intext:Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update  Dorks for finding Passwords filetype:htpasswd htpasswd intitle:"index of" ".htpasswd" -intitle...

Top 6 Password Cracking Techniques

Image
Top 6 Password Cracking Techniques Well I guess you allfind the 6 best password cracking techniques. Putting up a good and long password is advised by cyber security however cyber security does n’t teach us how to identify the hacker hacking into your computer. It does n’t matter how strong you are creating passwords, there is always be an option for hackers to crack your passwords. The hackers Nowadays have been creating well-developed algorithms, which can speed up the processes to discover your password codes. So if you are one of them who thought that putting up a tough password is a secure way to stay away from hacker then this article is just for you. Today we will discuss some password Cracking techniques used by hackers to hack into our account. 1. Dictionary Attack Dictionary Attack is a technique used by most of the regular hackers to determine the passphrase by trying their luck many times. Unlike its name, it works like a dictionary it is just a simple file wh...

NETWORK PASSWORD DECRYPTOR

Image
NETWORK PASSWORD DECRYPTOR About   Network Password Decryptor  is the free tool to instantly recover network authentication passwords stored on your system. In addition to the network authentication passwords it can also recover passwords stored by other windows apps such as  Outlook ,  Windows Live Messenger ,  Remote Destktop  etc. These network passwords are stored in encrypted format and even administrator cannot view these passwords. Also some type of passwords cannot be decrypted even by administrators as they require special privileges. Network Password Decryptor automatically  detect and decrypt  all these stored network passwords. With Version v5.0 onwards, it supports  network password recovery on all 64-bit platforms including Windows 8 . It works on both 32-bit &  64-bit   platforms starting from Windows XP to New  Windows 10 version . Features All  network  authentication ...

HOW TO DO BLIND SQL INJECTION MANUALLY

HOW TO DO BLIND SQL INJECTION MANUALLY ************************************************************************ Blind SQL Injection is used when a web application is vulnerable to an SQL injection but the results of the injection are not visible to the attacker. The page with the vulnerability may not be one that displays data but will display differently depending on the results of a logical statement injected into the legitimate SQL statement called for that page. This type of attack can become time-intensive because a new statement must be crafted for each bit recovered. There are several tools that can automate these attacks once the location of the vulnerability and the target information has been established. Blind SQL INJECTIONS: Suppose That You want to Hack This website with Blind SQLi http://example.com/index.php?id=5 when we execute this, we see some page and articles on that page, pictures etc then when we want to test it for blind sql injection attack http://www.e...