Friday, 2019-08-23, 9:27 AM
TechGeenix MainRegistrationLogin
Welcome Guest | RSS
Site menu
Section categories
Computer tricks and tips [5]
Advanced Computing [6]
H4ckers' Z0n3 [8]
Statistics

Total online: 1
Guests: 1
Users: 0
Login form
  
Main » H4ckers' Z0n3

Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures.
A social engineer runs what used to be called a "con game." For example, a person using social engineering to break into a computer network might try to gain the confidence of an authorized user and get them to reveal information that compromises the network's security. Social engineers often rely on the natural helpfulness of people as well as on their weaknesses. They might, for example, call the authorized employee with some kind of urgent problem that requires immediate network access. Appeal to vanity, appeal to authority, appeal to greed, and old-fashioned eavesdropping are other typical s ... Read more »
Category: H4ckers' Z0n3 | Views: 11099 | Added by: geenix | Date: 2012-09-12 | Comments (6)


Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures.
A social engineer runs what used to be called a "con game." For example, a person using social engineering to break into a computer network might try to gain the confidence of an authorized user and get them to reveal information that compromises the network's security. Social engineers often rely on the natural helpfulness of people as well as on their weaknesses. They might, for example, call the authorized employee with some kind of urgent problem that requires immediate network access. Appeal to vanity, appeal to authority, appeal to greed, and old-fashioned eavesdropping are other typical social engineering techniques.
Social engineering is a component of many, if not most, types of exploits. Viru ... Read more »
Category: H4ckers' Z0n3 | Views: 5386 | Added by: geenix | Date: 2012-09-12 | Comments (1)


You guys must be aware of Portal attack for hacking a website. Portal hacking A.K.A. DotNetNuke(DNN) attack.
So here it is, let’s start:
1.   Open google.com and type”inurl:fcklinkgallery.aspx” (this is for searching sites which are vulnarable to this attack.
2.   Now select any website from the list.
... Read more »
Category: H4ckers' Z0n3 | Views: 20220 | Added by: geenix | Date: 2012-09-10 | Comments (34)


Today we are releasing a very interesting whitepaper which describes a DNS poisoning attack against stub resolvers.
It discloses two vulnerabilities:
  1. A vulnerability in Java (CVE-2011-3552, CVE-2010-4448) which enables remote DNS poisoning using Java applets. This vulnerability can be triggered when opening a malicious webpage. A successful exploitation of this vulnerability may lead to disclosure and manipulation of cookies and web pages, disclosure of NTLM credentials and clipboard data of the logged-on user, and even firewall bypass.
    ... Read more »
Category: H4ckers' Z0n3 | Views: 1631 | Added by: geenix | Date: 2012-09-02 | Comments (1)


It is very easy to hack a human brain and pluck things such as bank details from the head using technology that costs only a few hundred dollars, scientists claim.A team of researchers from the University of Oxford in Geneva and the University of California in Berkeley explained the process using an off-the-shelf Emotiv brain-computer interface that only cost a few hundred dollars. Volunteers for the security experiment were asked to wear an Emotiv BCI head piece and sat in front of a computer screen that showed images of maps, banks and card PINS. The researchers then tracked the P300 brain signal, which is given off when the brain registers meaningful stimuli. The team found they could consistently reduce the random data in each variable by 15 to 40 per cent, a marked advantage over random guessing. Subjects were essential ... Read more »

Category: H4ckers' Z0n3 | Views: 1295 | Added by: geenix | Date: 2012-08-31 | Comments (1)


1. What is a Keylogger?
A keylogger (also called as spy software) is a small program that monitors each and every keystroke a user types on a specific computer’s keyboard. A keylogger program can be installed in just a few seconds and once installed, you are only a step away from getting the target password and other sensitive data.
2. How Keylogger works?
Once the keylogger is installed on a PC, it starts operating in the background (stealth mode) and captures every keystroke of the target computer.
Let’s take up a small example: The user on the target computer goes tohttp://mail.yahoo.com and types his "username” and the "password” in the respective fields to login. The keylogger silently records these keystrokes and stores them in the logs. These logs when opened up shows the captured " ... Read more »
Category: H4ckers' Z0n3 | Views: 886 | Added by: geenix | Date: 2012-08-28 | Comments (1)

The 10 of may the backtrack team has released the version number 5 (codename "revolution”) of their penetration tool.
Yes backtrack it’s a live Linux Distribution made with this goal, be the best penetration and learning tool around.
It’s Based on Ubuntu Lucid LTS (10.04). Kernel 2.6.38, patched with all relevant wireless injection patches. Fully open source and GPL compliant. In this release you can choose to have Gnome or KDE and install it on 32 or 64 bit computer. The former release supported only 32 bit installation.
... Read more »
Category: H4ckers' Z0n3 | Views: 1555 | Added by: geenix | Date: 2012-08-28 | Comments (1)


Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.
Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them.
Due to the mass attention given to blackhat hackers from the media, the whole hacking ... Read more »
Category: H4ckers' Z0n3 | Views: 830 | Added by: geenix | Date: 2012-08-28 | Comments (1)

Search
Calendar
«  August 2019  »
SuMoTuWeThFrSa
    123
45678910
11121314151617
18192021222324
25262728293031
Entries archive
Site friends
  • Create a free website
  • Online Desktop
  • Free Online Games
  • Video Tutorials
  • All HTML Tags
  • Browser Kits
  • Copyright k4ll0l © 2019