#XSS #SQLI Vulnerabilitys Detected By SkarY
Web WorldCam: http://goo.gl/XzTAa
Ciudad Necochea: http://goo.gl/x9OQk
Teabas Omnibus: http://goo.gl/OS3tI
Universidad de Moron: http://goo.gl/5MGax
Colegio Numen: http://goo.gl/oqALd
Atacado Sà Paulo: http://goo.gl/sB2Bg
Consigo Som & Imagem: http://goo.gl/RfYn6
Semanario de Lujan: http://goo.gl/Bze9d
Libros Preferidos: http://goo.gl/VPzyW
Gobierno BS.AS: http://goo.gl/mOH3X
Disclaimer: The following post is Amp's opinions and does not represent SoldierX. At the same time, I will reiterate that these posts are covered by this site's usage policy.
Here's the scenario. We have an individual who is essentially unemployed. On a regular basis, he is spouting off opinions and theories that are extreme, and in some cases outright insane. He has a neck-beard and a hairstyle that suggests questionable grooming habits at best. Most importantly, he has not contributed much of anything in recent years. In most scenario, individuals like this would be reviled and mocked heavily online. So why the fuck are we giving a free pass to Richard Stallman when he has essentially become this type of individual in recent years?
I need a hacker friend...seriously
I know its been a while since I've posted anything on here. As many members of SX can tell you, I have been very busy working on outside projects that can actually serve to be useful to my future work here. Recently though, I have looked a little bit into the basics of SQL injection as part of an outside project and I do wonder if a introductory tutorial on this topic would be a good read? If people think so, please let us know.
hi friends i am new to this website and hacking as well. my ques is that how can we hack the password of the admin in windows 7 if the guest account is activated and if unfortunately the guest account is deactivated, then how can we hack admin"s password in the starting when it asks for admins password on clicking on admins account
hey I want to learn Java anyone knows any site plz suggest it to me but I want video tutorials
thx in advance
1. First of all download the Gmail Phisher.
2. Extract the rar file now you will get three files as given below:
3. Upload all the Three files to any of the free Web hosting server. Remember while creating the account on these servers try the username as nearer as possible to the original URL like mail.gmaile or maile.gmall etc.. As its the most crucial step. Some Free Web hosting servers are given below you can also find few more for yourself.
4. Once you have uploaded all the
three files to web hosting server now
you have to send these to your victim.
This is the most important step
regarding smart phishing technique.
Most People use same password for
orkut and gmail and here is the main
hack lies. What you have to do you
have to send the HTML email to the
victim which looks similar to the Orkut
scrap to his email you can easily do
1. Backtrack 4 life CD/USB or installation;
2. Willing to read all this
The first you can download for free from
Username to enter backtrack: root
Type startx and hit ENTER key to fire up
the graphic of BT4.
Web need opened 3 terminals and let's
1. Airomon-ng stop wlan0 (This
command stops the wifi adaptor)
2. Airomon-ng start wlan0 (This
command starts the wifi adaptor in
3. Airodump-ng wlan0 (This command is
used only to pick network for test,by
signal strenght, channel, BSSID, ESSID.
The command is stopped with CTRL+C,
we are looking for network WPA or
4. Airodump-ng --channel (Channel
number) --bssid (MAC address of the
network) -w (File name to be saved the
captured information) wlan0 (Leave this
running and open new terminal)
Here is a good idea to mention that there
is two ways to get the key, one to wait for
client AP (access point) handshake or two
I am study DDOS atack..since this place is the rigth place to share..we hope this education..use for revenge bad thing become good news..i mean use it responbility..your own risk..
I am study to wreck easy exe..file..windows is accurate by exe file..any exe file will be read as app file..i am study not an expert anyway..i found little hole ..every computer need flash bios to run windows or any os..why they never see this weakness..since..virus can be run automaticly..why this is so hard to build DDOS..attacking server or link ..maybe need this software..why dont use this bios to attack..i used once..blue screen appearance and maybe damaging the processor..
sorry ..i am not learn english very well..
i want to invite brothers and sisters to try..
read this rules first..
Building fault-tolerant, high-availability (FTHA) systems has a dark side; an engineering trade off of between reliability and predictability. This should be obvious to anyone who has studied biological organisms. I define an organism as a complex system partitioned into highly specialized and tightly interrelated parts. This can describe a cell, a human being, or a FTHA system whether it supports an e-commerce site, vital infrastructure control, process control, or command and control.