Latest Hacking News

Hacking with new Ideas provide Latest Hacking News.

27 Nov 2013

Applications that made your life easy : For Android, Windows and iOS

Finance App Budget Buddy A full featured expense tracker and budget manager featuring the ability to track expenses by taking a photo. Just snap a picture of your bill, receipt, cash register total, or whatever is available when you are making a purchase. No fumbling around with your phone while you are paying your bill or checking out. You can also use the interactive Credit Union Locator to help you find a credit union in Ireland close...

25 Nov 2013

What are the Webshells : Think like Elit

Web Shells are the programs or scripts that are written in PHP ,Perl ,Python and by many other scripting Languages. Web-shells can be uploaded on the servers and used to provide web based interface to work on Servers by commands.Shells are basically work like Back-doors that are run from any kind of browsers. Web servers have become one of the main targets of malicious activity and are often a weak point within an organization’s...

23 Nov 2013

Installing Kali Linux on Android Device

Kali Linux is an advanced Penetration Testing and Security Auditing Linux distribution. Learn more about Kali Operating System read Kali Linux Best Operating System.  Kali Linux on any Android Tablet or Mobile:Getting Kali Linux to run on ARM hardware has been a major goal for us since day one. So far, we’ve built native images for the Samsung Chromebook, Odroid U2, Raspberry Pi, RK3306, Galaxy Note 10.1, CuBox, Efika MX, and...

21 Nov 2013

Virtual Patching : Why it is important

Every day, hackers are looking for —and finding — vulnerabilities in secure networks and applications. Most of these vulnerabilities can be eliminated by applying patches or fixed, but by some accounts, there are as many as seven critical patches released every day. For a busy security IT team, immediately applying those patches to every server is a cumbersome, and sometimes impossible, task. Compounding the problem is the shift to virtual environments....

18 Nov 2013

Bypass Any Firewall : SSH Tunnel Tutorial

On Last week in my Institute , i wanna access some websites  for study and chat also :D But i get blocked by network Firewall, i think its Netgear firewalls are a combination of hardware and software. The hardware part gives netgear firewalls excellent performance, while the software part allows firewalls to be tailored to your specific needs. Then i thought to bypass it .... As we know that Firewall is a basic component...

15 Nov 2013

Kali Linux : The Best operating System from Debian

. Kali the new glance rising star of Debian and we say - "New Version of Backtrack 5". Kali is a complete re-build of BackTrack Linux, adhering completely to Debian development standards. All-new infrastructure has been put in place, all tools were reviewed and packaged, and we use Git for our VCS. More than 300 penetration testing tools: After reviewing every tool that was included in BackTrack, we eliminated...

13 Nov 2013

How to Bypass Facebook photo tag verification

This is the new method to verify the photos even if the profile is blocked: Okay so i am gonna show you guys a little trick to bypass the Facebook Verification (Verify Images) Step 1: Go to Google images searchStep 2: Type facebook+"name of 1st friend" copy and paste from blocked accountStep 3: Search , you will see the picture of the 1st friend in the 1st 3 resultsStep 4: If you didn't identify the picture, repeat the sameStep 5: If you...

Tutorial : Cross-Site Request Forgery (CSRF)

Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF (sometimes pronounced sea-surf) or XSRF, is a type of malicious exploit of awebsite whereby unauthorized commands are transmitted from a user that the website trusts. Unlike cross-site scripting (XSS), which exploits the trust a user has for a particular site, CSRF...

11 Nov 2013

Network of Virus in Links

When you receives a congratulatory message to your computer , you can't judge that you computer affected from virus or spywares. These malicious virus like trojans and spywares, malwares silently attack to your system if you open these malicious mails..... Sometimes , on facebook or in your E-mail when you click on some link and your computer becoms slow or it shutdown abruptly, It means your computer infected from Virus . There are many...

6 Nov 2013

How to turn your Android phone or tablet into a Web, file, or media server

We all love our smartphones and tablets, but they go out of style so fast. With newer and more powerful gadgets coming out every six months or so, it doesn't take long for old phones to pile up around the house, especially if you’re on a family plan. You could recycle these old phones, or sell them, but we have a better idea. You should root it and turn it into a server for any one of the many needs you...