Category Archives: News On Hacks

Hacking website by sqlmap and backtrack.

Hacking website by sqlmap and backtrack.

In this tutorial, we will learn how to Find a vulnerable Link in a website, Exploit that link by SQL Injection and taking total control over any website,This includes access to usernames and passwords database, defacing it, address forwarding and much more.This is the most powerful attack against any website and can create a word-wide mess if done for evil purposes.
So What are we waiting for ? Lets Begin …

What Do We Need For This Attack ?

# Backtrack 5 (Would work On Windows Too,Just find a sql injecting software)
# SQLMAP – Automatic SQL injection and database takeover tool (Included in Backtrack)
# Internet Access
# Brains And Balls.

Better than BackTrack? Kali Linux offers new brand of pen-testing tools

BackTrack Linux no more. The popular open source package of penetration testing tools now has a new platform and a new name.
BackTrack Linux, a specialized distribution of penetration testing tools, has long been a favorite of security specialists and IT pros. It is often a tool recommended in TechRepublic discussions and in round-ups of open source tools for IT pros. The creators of BackTrack recently announced that in lieu of a new version, they have instead built a brand new distribution called Kali Linux that fulfills the same general purpose.
Writing five days after its initial release, the Kali team reported over 90,000 downloads and had already added more documentation and even an early bugfix. But what exactly is new in Kali and why did they scrap BackTrack and start all over? After putting together a wishlist of what they wanted in the next version of BackTrack, the developers realized they were looking at major changes: Continue reading Better than BackTrack? Kali Linux offers new brand of pen-testing tools

Introduction to Backtrack OS FOR HACKERS & SECURTIY

Google Offers Help to Webmasters Whose Sites Were Hacked

Google has launched a page and a set of tutorials aimed for webmasters whose site was hacked.

Specifically, Google explains webmasters how to deal with Google’s search warning that a site is dangerous, which usually appears if a hacker has infected the site with harmful code.

“Every day, cybercriminals compromise thousands of websites. Hacks are often invisible to users, yet remain harmful to anyone viewing the page — including the site owner,” claims Google on the site titled “Webmasters help for hacked sites.

Google starts with a video tutorial (above) which explains the basics of how and why sites get hacked, and then goes into more advanced territory with info on how to quarantine a site, identify its vulnerabilities and clean it up from harmful code.

How do you like Google’s latest initiative? Do you think the material is too advanced or perhaps too simple for the average webmaster? Share your thoughts in the comments.

Image credit: Google MORE

FBI: Hundreds Of Thousands May Lose Internet In July


WASHINGTON (AP) — For computer users, a few mouse clicks could mean the difference between staying online and losing Internet connections this summer.

Unknown to most of them, their problem began when international hackers ran an online advertising scam to take control of infected computers around the world. In a highly unusual response, the FBI set up a safety net months ago using government computers to prevent Internet disruptions for those infected users. But that system is to be shut down.

The FBI is encouraging users to visit a website run by its security partner, , that will inform them whether they’re infected and explain how to fix the problem. After July 9, infected users won’t be able to connect to the Internet.

Most victims don’t even know their computers have been infected, although the malicious software probably has slowed their web surfing and disabled their antivirus software, making their machines more vulnerable to other problems.

Last November, the FBI and other authorities were preparing to take down a hacker ring that had been running an Internet ad scam on a massive network of infected computers.MORE

Fake Instagram app infects Android devices with malware

InstagramTempted to try out the much talked about Instagram app? Well, be careful where you get it from – as malware authors are distributing malware disguised as the popular app.

It’s a rain cloud on a summer’s day for the Instagram photo-sharing smartphone app, which is otherwise having a glorious time right now.

First of all, Instagram released a first version for Android and managed to get five million downloads in less than a week.

Then the 13-employee firm managed to sell itself to Facebook for a cool $1 billion, making some of us wonder about privacy, and others think – “to heck with that, do I have a program that’s never earnt any money that I might be able to flog to Mark Zuckerberg?”.

Naturally, the Facebook acquisition news raised Instagram to even higher levels of public awareness and that’s where the bad guys stepped in.

Cybercriminals have created fake versions of the Instagram Android app, designed to earn money from unsuspecting users.MORE

3 Hackathons Trying to Change the World


Scott Henderson is managing director of CauseShift, writes about social impact for the Chronicle of Philanthropy, and is founder of, a media collaborative covering the startups, non-profits, and companies making the world better.

When you think of hackathons, you might think of coding, right? That’s certainly where the concept came from, but it’s taking on new meaning, as more non-profits and civic leaders embrace it as a format for social innovation.

In recent years, hackathons have helped city governments across the country build new web and mobile applications. These apps provide services like a way to report potholes. Now, hackathons are being used by an even wider range of sectors that involve social good. Below are three that are leading the way.MORE

Corrupt call center workers selling your private information for pennies

[Featured] CHFI & Digital Forensics Tutorial [Part 2] – AutoSpy Case & MD5 Calculator (Video)

Thief with secrets image courtesy of ShutterstockAccording to the Daily Mail an undercover investigation in India has uncovered that some call center workers have been selling confidential information on nearly 500,000 Britons.

Undercover reporters from The Sunday Times met with two individuals who claimed to be IT workers who offered to provide them with 45 different types of data gathered from the victims.

Information offered up included names, addresses, phone numbers and credit card details (including CCV/CVV codes and expiration dates).

The reporters allege they could purchase the records for as little as 2 pence apiece ($0.03 USD). One of the IT workersthieves bragged:

"These [pieces of data] are ones that have been sold to somebody already. This is Barclays, this is Halifax, this is Lloyds TSB. We’ve been dealing so long we can tell the bank by just the card number."more

How Anonymous spied on FBI / UK Police hacking investigation conference call


Conference call spy image from Shutterstock

Conference call spy image from ShutterstockLast month, we reported how a conference call, between the FBI and Scotland Yard, discussing their investigation into Anonymous hackers had been secretly recorded by the hacking collective and published on the net.

We surmised at the time that the unknown hackers might have secretly accessed the call by compromising a police investigator’s email account, as the call-in details and passcode were posted by Anonymous on their usual dumping ground – the PasteBin website.

Conference call email, republished by Anonymous

Conference call email, republished by AnonymousYesterday’s announcement by the FBI about the prominent LulzSec hacker Sabu, and other alleged hacktivists, has revealed more details about what actually happened.

According to an FBI press release, a Garda (Irish police) officer who was invited to attend the conference call about ongoing hacking investigations forwarded the message to a personal email account.

Unfortunately, that personal email account was compromised by a hacker.MORE

Facebook Canada Hosts Youth Focused Hack-a-thon

hack image

Hack-a-thons are becoming popular ways to get a massive group of hackers together for a manic, usually overnight blitz to code something cool. Hack for a Cause is one of the newest to apply that Red Bull-fueled creativity to social and charity causes.

In just 12 hours (6 p.m. on Friday to 6 a.m. Saturday, EST), 60 coders created 12 products that were ready to ship. The event, hosted at Facebook Canada’s Toronto headquarters, was organized by Free the Children, a Canadian charity that empowers youths across North America to create positive change.

The rules of the hack-a-thon were pretty simple: Come up with some product that will help Free the Children get kids engaged in positive actions. In response, Hack for a Cause turned out Facebook apps to help log and share volunteerism, a mobile app that accepts and displays donation pledges, an interactive map that allows users to see local philanthropic meet ups, educational mobile games and more.

Even though Hack for a Cause is relatively single-minded, as far as hack-a-thons go, providing Free the Children with new technology will hopefully have widespread impact as well. Besides, it’s not such a bad idea to host a group of uber-talented coders and get some awesome new products in return. It’s a smart move by Free the Children that may help some kids get more involved in social change.MoRe