Jump to content
Search In
  • More options...
Find results that contain...
Find results in...

Hackers Using Google Analytics to Bypass Web Security and Steal Credit Cards

Hackers Using Google Analytics to Bypass Web Security and Steal Credit Cards
Read more...

Researchers Uncover Novel Way to De-anonymize Device IDs to Users' Biometrics

Researchers Uncover Novel Way to De-anonymize Device IDs to Users' Biometrics
Read more...

Try challenges


Register & Join The Game

Break It

Welcome to Exploit Zone


Become a ninja in the shadow !

News
  • Welcome To Exploit Zone
  • The kingdom of knowledge sharing in hacking
  • New Updates ! Stay Tunned !
  • Share your knowledge here !
  • unlash your power on our challenges !
  • Become a ninja in the Shadow !

Ebook

Sign in to follow this  

5 files

  1. Free

    How To Hack Into A Computer On LAN

    NetBIOS Hacking is the art of hacking into someone else’s computer through your computer. NetBIOS stands for “Network Basic Input Output System.” It is a way for a LAN or WAN to share folders, files, drives, and printers

    12 downloads

       (0 reviews)

    1 comment

    Submitted

  2. Free

    SQL INJECTION

    It is a trick to inject SQL query/command as an input possibly via web pages. Many web pages take parameters from web user, and make SQL query to the database. Take for instance when a user login, web page that user name and password and make SQL query to the database to check if a user has valid name and password. With SQL Injection, it is possible for us to send crafted user name and/or password field that will change the SQL query and thus grant us something else.

    11 downloads

       (0 reviews)

    0 comments

    Submitted

  3. Free

    Infested DOXing Guide

    There are many ways to get the DOX of someone, but here's what I do. It is very simple, but it gets the job done. 
     
    Start with a name. Acquire your victim's first and last name. A good place to find this is their Facebook or any other account they have. 

    4 downloads

       (0 reviews)

    0 comments

    Submitted

  4. Free

    Ghost in the Wires

    I met Kevin Mitnick for the first time in 2001, during the filming of a Discovery Channel documentary called The History of Hacking, and we continued the contact. Two years later, I flew to Pittsburgh to introduce him for a talk he was giving at Carnegie Mellon University, where I was dumbfounded to hear his hacking history. He broke into corporate computers but didn’t destroy files, and he didn’t use or sell credit card numbers he had access to. He took software but never sold any of it. He was hacking just for the fun of it, just for the challenge. In his speech, Kevin spelled out in detail the incredible story of how he had cracked the case of the FBI operation against him. Kevin penetrated the whole operation, discovering that a new hacker “friend” was really an FBI snitch, learning the names and home addresses of the entire FBI team working his case, even listening in on the phone calls and voicemails of people trying to gather evidence against him. An alarm system he had set up alerted him when the FBI was preparing to raid him. When the producers of the TV show Screen Savers invited Kevin and me to host an episode, they asked me to demonstrate a new electronic device that was just then coming onto the consumer market: the GPS. I was su

    2 downloads

       (0 reviews)

    0 comments

    Updated

  5. Free

    Computer Viruses

    It would be difficult to describe the impact of viruses — and their cousins Trojan horses and worms — without resorting to clichés or sensationalism. But after all the hoopla, the bottom line is pretty simple: Malicious people write viruses, and viruses do bad things to our computers. Over the past two decades, viruses have caused billions of dollars in damage and lost productivity — and that’s just the impact on businesses. Viruses hit home computer users much harder because home users usually don’t have information-technology support departments to install and maintain antivirus software and repair damaged computers.
    But viruses can be stopped before they stop us, and it’s not hard to stop them. Getting antivirus software is part of the solution. Using antivirus software is just a matter of doing a few simple chores to make sure that everything is working correctly: the better antivirus programs available today do all the regular tasks automatically, and only rarely do they require you to do something special.
    If the information on your computer is important to you, then it’s worth protecting. You can do several things to help protect your computer and the information stored in it. The Internet is not exactly a friendly place; in fact it can be quite hostile and unforgiving to those who are unable to protect themselves. But since you have either purchased or borrowed this book, you’re on the verge of being able to get rid of the viruses on your computer and keep them away for good. It’s all within your grasp! 

    0 downloads

       (0 reviews)

    0 comments

    Updated

Sign in to follow this  

Announcements


×
×
  • Create New...