Posts

Showing posts from August, 2015

How to hack Windows 10 password in less than 5 minutes

Image
Windows 10 Password Crack via Command Prompt Command Prompt (command shell or cmd.exe) is another free application in Windows operating system that can help you when you forgot Windows 10 password. Just run the application. Note: To use Command Prompt to reset password, you need to have another account to login as an administrator. Click "Start" and type "command" in the search box.Right-click on Command Prompt and "Run as administrator".Type "net user Username New password" in Command Prompt as below. Hit Enter.

#microsoft #windows10 #password #hack #crack #infizeal

Veracrypt with PIM | Extra Security Added

Image
Encrypting your sensitive data is important. As you may know, CIA... ConfidentialityIntegrityAvailability ...are the essential elements of Information Security.
There are a number of tools and methods available out there, but not all encryption tools are same.

VeraCrypt, a TrueCrypt alternative, is an open source file encryption software designed to protect your online privacy.
VeraCrypt enters the market within months after TrueCrypt died, almost similar to it, but with enhancements to further secure your data.
A week ago, latest version VeraCrypt 1.12 released with a new feature called PIM, which stands for "Personal Iterations Multiplier".PIM (Personal Iterations Multiplier) is a new parameter introduced in VeraCrypt 1.12 to secure your data. Your Password is being used to mount the encrypted container or partition, whereas…

PIM value will decide the number of iterations, or in simple term, the speed of the mounting and booting process, simply brilliant. This feature makes…

Kali Linux 2.0 Unleashed | Most Powerful OS

Image
Offensive Security, the creators of Swiss army knife for Security researchers, Penetration testers and Hackers have finally released the much awaited and most powerful version of Kali Linux 2.0.
Kali Linux 2.0 (Codename ‘Kali Sana’), an open-source penetration testing platform brings hundreds of Penetration Testing, Forensics, Hacking and Reverse Engineering tools together into a Debian-based Linux distribution.
Kali Linux 2.0 offers a redesigned user interface for streamlined work experience, along with a new multi-level menus and tool categories options.
Kali Linux 2.0 is now a rolling distribution, means users will receive tools and core system updates frequently.
Kali Linux 2.0 Features:
Runs on Linux kernel 4.0, use full Gnome 3 Desktop instead of gnome-fallback, improved hardware and wireless driver coverage, support for a variety of Desktop Environments, updated desktop environment and tools, Featuring new cutting-edge wireless penetration tools, Kali Linux now added desktop noti…

How to gain Root Access Android Phone ?

Image
Millions of Android devices could be hacked exploiting a plugin that comes pre-installed on your Android devices by the manufacturers.

Most of the Android device manufacturers pre-install ‘Remote Support Tool (mRST)’ plugin onto their phones that are intended to help users, such as RSupport or TeamViewer.
But, a critical Certifi-Gate security vulnerability in this mRTS plugin allows malicious applications to gain illegitimate privileged access rights, even if your device is not rooted. "Certifi-Gate" Android security vulnerability
According to Israeli researchers at Check Point, Ohad Bobrov and Avi Bashan, Certifi-Gate Android vulnerability lies in the way Google’s partners (manufacturers) use certificates to sign remote support tools.
Remote support tools often have root level access to Android devices, even if your device is not rooted. Thus any installed app can use Certifi-Gate vulnerability to gain unrestricted device access, including: screen scrapingkeyloggingexfiltrati…

Mozilla Firefox | File Stealing Exploit

Image
Earlier this week, Mozilla Security researcherCody Crewsdiscovered a malicious advertisement on a Russian news site that steals local files from a system and upload them to a Ukrainian server without the user ever knowing.

The malicious advertisement was exploiting a serious vulnerability in Firefox's PDF Viewer and the JavaScript context in order to inject a script capable of searching sensitive files on user's local file systems.
Mozilla versions of Firefox that do not contain the PDF Viewer, such as Firefox for Android, are not affected by the "Same origin violation and local file stealing via PDF reader" vulnerability.
The exploit does not execute any arbitrary code but injects a JavaScript payload into the local file context, allowing the script to search for and upload potentially user’s sensitive local files.

All an attacker need to do is load the page with this exploit and sit back and relax. The exploit will silently steal files in the background.
According t…

How to hack your xbox 360 completely

Image
So you want to hack your 360.
Have no idea where to start?

This thread should give you a general idea on what you can do with your 360.


Lets get started.
First of all you'll need to determine the age of your console.
This will give you a general idea of what hack you can apply.

On the back of the 360 there is a sticker near the AV port (Phat*&Slim*)
On that you'll find the MFR date as well as the Console Serial and Product ID.

Determining the age of the 360









You'll need to write down your MFR date.
This will roughly tell you what board you have in your 360.

Xenon: 2005 - 2007 203w power supply, can be JTAGged and RGH'd (14699 only) & R-JTAGged.
Zephyr: 2007 - 2008 203w power supply, can be JTAGged and RGH'd (Hard to achieve) & R-JTAGged.
Opus: Only from RRoD Repairs from MS (rare revisions) 203/175w power supply, can be JTAGged and RGH'd & R-JTAGged.
Falcon: 2007 - 2009 175w power supply, can be JTAGged and RGH'd & R-JTAGged.
Jasper: 2008 - 2010 …