Reveal Asterisk Saved Pass...

This tips and trick about Reveal Asterisk Saved Passwords on Mozilla Firefox and Chrome is continuing our last tips and trick about How to Reveal Asterisks Password on Log In Page where on our previous tips and trick maybe not too clear and its only limited with a few browsers.We will learn how to reveal the asterisk on Mozilla Firefox and Google Chrome without...

Facebook Phishing while Us...

It's already 2 days I saw the weird interface of unencrypted facebook page. Facebook phishing while using freegate, did freegate did this? or they have been hacked by someone or government to serve the phishing page? hmm no one knows about it 🙂This happen yesterday August 30, 2013 when I open my facebook account, usually I always use the "remember...

How to do Network Mapping ...

How to do Network Mapping using Traceroute? is it possible to map the network only by using the traceroute?the answer is yes 🙂Network mapping is interesting because we will try to draw the computer network only from a data that we received from a command line.According to wikipedia:Network mapping is the study of the physical connectivity of...

Skype Backdoor Confirmed

So when I saw this article:http://www.h-online.com/security/news/item/Skype-with-care-Microsoft-is-reading-everything-you-write-1862870.htmlI was disappointed the rumoured skype backdoor is claimed to be real, and that they have evidence.  The method by which they confirmed is kind of odd– not only is skype eavesdropping but its doing head...

XSS Attack: Finding Simple...

When reading "a lot of" request tutorial from you :-P, I will pick the topic about XSS Attack: finding simple XSS vulnerability. For some of you who already life in a web programming (client or server side scripting) maybe it's not a hard thing to find some web application bug that lead to XSS attack. But anyhow because I have slogan "from zero...

How to Browse Website Usin...

The title for today tutorial how to browse website using command prompt is my personal experience, back when I'm a student, on that time I just started learn about Linux and I'm addicted to it. One time I come to a linux program lynx that can open a webpage or website in a console mode (without GUI), then I ask a question to myself: "how about Windows...

PHP Web Shell and Stealth ...

Today I will continue the second part of how to use the PHP web shell and stealth backdoor : weevely. If you haven’t read my previous post, you can check and see the tutorial here.The topics for hacking tutorial today is about how to do download the file using weevely php web shell, and also implement the reverse_tcp modules so we can connect directly to...

PHP Stealth Web Shell and ...

Weevely PHP stealth web shell and backdoor is a PHP web shell that provides a telnet-like console to execute system commands and automatize administration and post-exploitation tasks. It is an essential tool for web application post exploitation, and also can be used as stealth backdoorWhere to find weevely php stealth web shell and backdoor? actually when you...

Google PageRank Checker an...

Wikipedia wrote that Google PageRank checker is a link analysis algorithm, named after Larry Page and used by the Google web search engine, that assigns a numerical weighting to each element of a hyperlinked set of documents, such as the World Wide Web, with the purpose of “measuring” its relative importance within the set. The free Vishnu Valentino...

Check Server Header Tool :...

Http status code checker will check if your website returns the wrong HTTP status code, wrong status code will make search engines cannot index your web pages. For that reason, it is important to check the response code that your web server sends to search engine spiders and make sure your web pages HTTP status code indicate ready to...

Reverse IP Address Domain ...

Reverse IP Address Domain Check Online Tools was another tool I create to do scanning for IP address or domain name.A reverse IP domain check online tools takes a domain name or IP address pointing to a web server and searches for other sites known to be hosted on that same web server. Data is gathered from search engine results, which are not guaranteed to be...

PHP Exec for Executing a P...

Date : June 2, 2012Type : TutorialLevel : EasyActually this post was a little bit different with my other posts because I put the date attribute on the top of this post. Actually its because today was my birthday and I want to say thank you to all of the follower of this blog in twitter, facebook (that reach 1K more in my birthday 🙂 ),...

Google Hacking Tutorial + ...

Type : TutorialLevel : EasyPurpose : As a website owner you can also aware with this kind of attack to your web serverWhy I wrote this tutorial about Google Hacking is because there are some people keep messaging me about how to perform Google Hacking…A lot of people that learn about hacking they just think that hacking was going through a...