ABOUT US

Welcome to ViP IT TIPS and TRICKS here you got more information about IT Tips and Tricks....So Must click on http://vipittips.blogspot.com

Thursday, May 1, 2014

KALI Linux Mailing List Website Hacked Using Heartbleed Vulnerability.

When it comes to Digital Forensics, Penetration and Security testing, we mostly relies on Kali Linux distribution (also known as Backtrack), which is designed for security professionals and packed with more than 300 security testing tools. But Today, Mailing List sub-domain of Kali Linux get hacked and defaced by Libyan hacking group known as ‘The GreaT TeAm (TGT)’. A mailing list is simply a list of email addresses to which the same information is being sent. A discussion list is used to allow a group of people to discuss topics amongst themselves, with everyone able to send mail to the list and have it distributed to everyone in the...

Wednesday, April 30, 2014

Phishing Method Facebook Mobile Hacking using Wapka.

Phishing Method Facebook Mobile Hacking using Wapka [undetectable]. What is Phishing ? Phishing is a way of deceiving your victim by making him login through one of your webpages which is a copy of the original one. By doing so the fake webpage will save his E-mail ID or username and password. This is used for criminal activities for stealing Credits Cards and So on. Now we are going to make a fake login page of Facebook Mobile. Lets start the tutorial... Step 1: Register a new Wapka Account First create a new wapka account from the link below. Step 2: Editing Wapka Texts Login to your Wapka account. Goto Settings>Edit text> Forum/chat and change the following words, Name: Email or Phone Text: Password Submit: Log In It's shown in the screenshot below. Click 'Edit' to save...

Tuesday, April 29, 2014

Create Binary Virus To Format Hard Disk

Create Binary Virus To Format Hard Disk.1. Copy the below codes into Notepad.010010110001111100100101010101010100000111111000002. Save the file as Format.exe 3. You just created virus to format Hard Drive. Enjoy !!!Warning: Please don't try to run on your own computer or else it will delete all the content of your C Drive. I will not be responsible for any damage done to your computer...

Saturday, April 26, 2014

Ethical Hacking Basics: Here Are 10 Awesome SSH Hacks.

Ethical Hacking Basics: Here Are 10 Awesome SSH Hacks. Secure Shell (SSH) is widely used by network administrators to control Web and other kinds of servers remotely. The UNIX-based command interface and protocol can also be used to tunnel your traffic, transfer files, mount remote file systems, and much more. We have compiled here a list of 10 awesome SSH Hacks.1.Giving SSH keys unique namesParticularly useful when you're administering a number of remote computers. You can name the SSH keys anything you want.2.Putting long commands in text filesIn this way you can use your long command to log in and run on a remote PC:xyz@local:~$ ssh user@remotehost...

Here are 20 ways to become a better Ethical Hacker.

Here are 20 ways to become a better ethical hacker: 1. Learning scripting languages such as Python, Perl and ruby is highly advisable. This in turn will help you in automating your tasks while also improving your skills. 2. Good ethical hackers need to know and ynderstand all possible user inputs to stay ahead in their game.3. Ok, so you have successfully gained access to someone's account! Pat your back soldier, but that doesn't mean you're good. A good hacker would ensure he/she does not leave behind any trail whatsoever. Take note and don't alter a thing, simply watch and fetch the relevant information you seek and off you...

Page 1 of 67123Next