Latest News :
Recent Posts
Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

BackTrack [Hacking Gmail, Facebook, etc]


 
FILE INFORMATION
.
BT Official Wikipedia 

--------------------------------------------------------------------------------------------

 This Tutorial is "STRICTLY" for "EDUCATIONAL" purpose only. 
Don't Misuse It. 

--------------------------------------------------------------------------------------------

Plzzzz CLICK HERE To SupporT Us 

Keylogging [Ardmax Keylogger 3.8.9 Full]


 
FILE INFORMATION
.
 This Tutorial is "STRICTLY" for "EDUCATIONAL" purpose only. 
Don't Misuse It. 

Keystroke logging (more often called keylogging or "keyloggers") is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. There are numerous keylogging methods, ranging from hardware and software-based approaches to electromagnetic and acoustic analysis.

Source: Wikipedia  

Phishing [Hack Facebook, Gmail, Yahoo, Google+ and Others]

 
FILE INFORMATION
.
 This Tutorial is "STRICTLY" for "EDUCATIONAL" purpose only. 
Don't Misuse It. 

Phishing is attempting to acquire information (and sometimes, indirectly, money) such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware. Phishing is typically carried out by e-mail spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.

Ratting (Remote Administration Tool) [Hack Someones Computer]

 
FILE INFORMATION
.
 This Tutorial is "STRICTLY" for "EDUCATIONAL" purpose only. 
Don't Misuse It. 

A remote access tool (a RAT) is a piece of software that allows a remote "operator" to control a system as if he has physical access to that system. While desktop sharing and remote administration have many legal uses, "RAT" software is usually associated with criminal or malicious activity. Malicious RAT software is typically installed without the victims knowledge, often as payload of a Trojan horse, and will try to hide its operation from the victim and from security software.
The operator controls the RAT through a network connection. Such tools provide an operator the following capabilities:
  • Screen/camera capture or image control
  • File management (download/upload/execute/etc.)
  • Shell control (from command prompt)
  • Computer control (power off/on/log off if remote feature is supported)
  • Registry management (query/add/delete/modify)
  • Other software product-specific functions

A diagram is shown below which illustrates the remote administrator as the "client" connected to multiple "server" computers that are performing various functions:

Func   Func
   \    /    Func    Func
    [SERVER]   \    /
       |    [SERVER]
       |      /
       |     /
       |    /   Func    Func
       |   /      \     /
    [CLIENT]------[SERVER]


Source: Wikipedia 

 
Plzzz CLICK HERE To SupporT Us
 
Support : SandD Corporation | Sandy | StuffZone
Copyright © 2012. StuffZONE: Find Your Stuff - All Rights Reserved
Template Created by Sandy Published by SandD Corporation
Proudly powered by Me