Friday, August 21, 2015
CoderXNews
Yes, you heard it right. It's the dirty truth that’s featuring what is being called the largest privacy breach ever.
Billions of cell phone users are at risk of a vulnerability in the SS7 inter-carrier network that allows hackers and spies agencies to track locations and intercept all voice calls from anywhere in the world.
This is something we already know from the last year's Snowden leaks
that explained the National Security Agency (NSA) capabilities to gather nearly 5 Billion records a day on mobile phone locations around the world.
But, it's worse than we have thought.
The famous Australian TV programme "60 Minutes" demonstrated that it is possible for anyone to track cell phone location and intercept calls and text messages.
This time, not due to a security vulnerability in the phone's operating
system, but due to a serious flaw in the very system our cell phones use
to communicate with each other around the world – The global signaling system, called SS7.
Thursday, August 20, 2015
CoderXNews
Web.com Hacked! Credit Card information of 93,000 Customers Compromised
Web.com, a Florida-based web hosting company with up to 3.3 Million
customers, has suffered a data breach and may have compromised personal
information and credit card data belonging to 93,000 of its clients.
The company on Tuesday confirmed that some unknown hackers had breached
one of its computer systems on August 13, 2015, and accessed personal
information of nearly 93,000 customers.
Web.com, with the goal to help small businesses succeed online,
uncovered the unauthorized activity as part of its ongoing security
monitoring and shutdown process.
The stolen information includes:
- Credit Card information
- Actual Names associated with the payment cards
- Residential Addresses
Monday, July 13, 2015
Unknownskype
Skype WebCam Hack
Skype
(play /'ska?p/) is a proprietary voice-over-Internet Protocol service
and software application originally created in 2003 by Swedish
entrepreneur Niklas Zennström and his Danish partner Janus Friis. It has
been owned by Microsoft since 2011.
Many ppl want to view web cam them partner boy/girl friend after skype release 5.1.x version Pakistani Hacker Created exploit which allow to ppl view Webcam without permission Software usage is easy
1 -uninstall all skype which u have already installed
2 - minimum 3 person on convertion call user must be all online in call (many ppl trying to make offline user call to test software not work bcz user need online
3 - skype all use must be on pc online on window or linux Some Os Also support this exploit remove installed dir form to C:Programm file Run Setup of Skype webcam hack and follow the video which exploit creater make there is 2 file 1 is setup if after installing not workng then run Skype-x.exe file which ll patch skype registry
Monday, May 25, 2015
Kazy Bot Full Version ( Cracked)(No Port Forward)
step 1 ) upload files from php folder to your hosting's public_html folder
step 2 ) create datebase with name kazybot
step 3 ) import database file to your kazybot database
step 4 ) connect your server from window client
step 5 ) build server.exe with your server address
==+==+==+==+==+==+>Enjoy Hacking<==+==+==+==+==+==+==+==
Thursday, May 21, 2015
CoderXEbooks, Security, Web Hacking
The Webapplication Hackers HandBook
Chapter 1 Web Application (In)security
Chapter 2 Core Defense Mechanisms
Chapter 3 Web Application Technologies
Chapter 4 Mapping the Application
Chapter 5 Bypassing Client-Side Controls
Chapter 6 Attacking Authentication
Chapter 7 Attacking Session Management
Chapter 8 Attacking Access Controls
Chapter 9 Attacking Data Stores
Chapter 10 Attacking Back-End Components
Chapter 11 Attacking Application Logic
Chapter 12 Attacking Users: Cross-Site Scripting
Chapter 13 Attacking Users: Other Techniques
Chapter 14 Automating Customized Attacks
Chapter 15 Exploiting Information Disclosure
Chapter 16 Attacking Native Compiled Applications
Chapter 17 Attacking Application Architecture
Chapter 18 Attacking the Application Server
Chapter 19 Finding Vulnerabilities in Source Code
Chapter 20 A Web Application Hacker’s Toolkit
Chapter 21 A Web Application Hacker’s Methodology
Chapter 2 Core Defense Mechanisms
Chapter 3 Web Application Technologies
Chapter 4 Mapping the Application
Chapter 5 Bypassing Client-Side Controls
Chapter 6 Attacking Authentication
Chapter 7 Attacking Session Management
Chapter 8 Attacking Access Controls
Chapter 9 Attacking Data Stores
Chapter 10 Attacking Back-End Components
Chapter 11 Attacking Application Logic
Chapter 12 Attacking Users: Cross-Site Scripting
Chapter 13 Attacking Users: Other Techniques
Chapter 14 Automating Customized Attacks
Chapter 15 Exploiting Information Disclosure
Chapter 16 Attacking Native Compiled Applications
Chapter 17 Attacking Application Architecture
Chapter 18 Attacking the Application Server
Chapter 19 Finding Vulnerabilities in Source Code
Chapter 20 A Web Application Hacker’s Toolkit
Chapter 21 A Web Application Hacker’s Methodology
Subscribe to:
Posts (Atom)