Senin, 20 Juni 2016

How To Upload Shell in Joomla Via Admin Panel

Hello Guys! Successfully Hacked into Joomla Admin Panel? Not sure how to upload shell in jooma via admin panel? well your are at right place because today we are talking about How To Upload Shell in Joomla Via Admin Panel. Today I'm going t teach you How To Upload Shell in Joomla Via Admin Panel. Its pretty simple! just follow the following steps given below  :) :-

NOTE: THIS IS ONLY FOR EDUCATION PURPOSES, AND FOR SAFETY PURPOSE. WE ARE NOT RESPONSIBLE ANY HARM DONE BY YOU.

How To Upload Shell in Joomla Via Admin Panel:

Suppose we have an access to joomla admin. Now just login into it..



Once you Login you see the below screen.



Then look for Extensions and in that Template Manager.



Once you click on that you will see all the templates installed on that site.



See the marking in red it has the star. It means its the default template used by the sites currently. Select any of the template like it did beez in green.



Once you click on beez you will see the following screen. now just click on edit html



Once you click on edit html you will see the following screen



see the red part /templates/beez/index.php that is the path of your shell

Now just paste your shell code over their and save it




Once you click on save. it will take you to page were it will show you Template source saved. you work is done..

Once that is done you can access your shell. Path of the shell would be

www.site.com/templates/beez/index.php

Read more

inj3ct0r 1337day Clone Blogger Template: Viorenza World 2016


Hello Readers! Many people asked me is there any template for blogger meant for hackers or Please share some blogger templates for hackers. So today I thought of sharing a Template named  Viorenza World for blogger that is actually a clone of  inj3ct0r 1337day [Www.1337day.coM] ..


So here it is(Download Link Updated 2016):-


Some Adons:-

1). Search Box:- To add a Search Box at the bottom of the header or logo as shown in demo just click on Add a Gadget and select HTML/JavaScript from the list and paste the below code:-
<center>
<form action = ' http://Hackers-Store.blogspot.com/ search 'id =' searchform 'method =' get 'name =' searchform '>
<b/>
<font face = "Tahoma "size =" 2 ">
<span style="color:#008800"> [Search: </ span>
<b/>
<input id = 's' name =' q 'onblur =' if (this.value = = "") {this.value = "";} 'onfocus = "if (this.value ==" ") {this.value =" "}' type = 'text' value ='' />
<input id = 'searchsubmit' type = 'submit' value = 'submit' />
</ b> </ font> </ b> </ form> </ center>

  • Replace the RED BOLD link with your blog's link and click Save.
  • And Drag it to the top of the blog post.. 
2). RSS Feed:- To add RSS Feed at bottom as shown in Demo just Navigate to Blogger's Layout click Add Gadgets and select Feed Gadget from the list..


After adding Enter this url in Feed Gadget:-
http://hackers-store.blogspot.com/feeds/posts/default/
Replace RED BOLD link with your blog's link and click Save..
thats it guys :) share it :)
Read more

Havij Pro 1.17 Free Full Version Download 2016












 Havij Pro 1.17 Version Free Full latest crack Download. Many of you guys are looking for Latest Havij Pro 1.17 Version Full Download. So i have uploaded a crack for Havij Pro 1.17 Version Full Free Download. So that you can use it freely :)Download Havij Pro 1.17 Full Free / Havij 1.17 Pro Full Version Download Havij 1.17 Pro Full Download - Exploit SQL Injection Attack Tool!
Havij  is an automated SQL Injection Tool That Helps Penetration. Testers To Find and Exploit SQL Injection Vulnerabilities On a Web Page...

NOTE: THIS IS ONLY FOR EDUCATION PURPOSES, AND FOR SAFETY PURPOSE. WE ARE NOT RESPONSIBLE ANY HARM DONE BY YOU.



Havij Pro 1.17 Version Full Download


DOWNLOAD :









It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and  password hashes, dump tables and columns, fetching data from the database, running SQL  statements and even accessing the underlying file system and executing commands on the  operating system.

The power of Havij That Makes it different from similar tools is its injection methods. The success rate is more than 95% at injections vulnerable targets using Havij.
The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users.

Features of Havij Pro 1.17 Full Version Free
  •     HTTPS support
  •     Add MSSQL Blind
  •     MSAccess more Blind (commercial version only)
  •     PostgreSQL added (only commercial version)
  •     Check for more updates.
  •     User manual query with additional results. (Only the commercial                 version)
  •     First line on the first request (all in one request), plus (commercial             version only)
  •     Dumping the data to a file is added (only commercial version)
  •     Data stored in XML format added (only commercial version)
  •     Inject the target with an increase in port (the default http port is 80)           (only commercial version)
  •     XSS bug in saved reports fixed.
  •     Remove log added.
  •     Apply button is added to the set makes it possible to change the settings     at any time (only commercial version)         
  •     Keyword testing and repair methods are added.
  •     Find a sequence of computed columns and optimized for better injection     and database to detect.
  •     Find the number of columns and column wires for the better.
  •     “414 Request URI too long” error fixed.
  •     New method to get the table and column in MSSQL further.
  •     An in MSAccess injection when syntax errors are fixed manually defined.
  •     Active XP_Exec add cmdshell (only commercial version)
  •     Active OS_Ex add cmdshell (only commercial version)
  •     Remote desktop-Enable added to cmdshell (only commercial version)
  •     Confusing MySQL, MSSQL 2005, when they found that the number of         fixed columns.
  •     Broken MD5-cracker site removed.
  •     Bug in MSSQL error detection is not fixed.
  •     An error in the error column MSSQL is not fixed.
  •     Bug in injecting into access database fixed.
  •     Bug fixed in the data in MSSQL.
  •     Find an error in mssql fixed.
  •     Bug in detecting database type when the number of fixed columns.
  •     Bug in MSSQL error syntactic fixed and executation manually.


:)

Read more

Google Dorks: Find Already Uploaded Backdoored c99 Shells 2016

Google Dorks: Find Already Uploaded Backdoored c99 Shells. So today we will talk about How to find c99 Shells from google dorks. People always keep a backdoore in their hacked sites in-case they miss their shell or admin delete it. So here, we will provide you a huge list of google dorks thorugh which you guys can find c99 shells from google.

POST UPDATED with new latest dorks! 2016

Google Dorks: Find Already Uploaded Backdoored c99 Shells
Google Dorks: Find Already Uploaded Backdoored c99 Shells

Google Dorks: Find Already Uploaded Backdoored c99 Shells


 Google Dorks: Find Already Uploaded Backdoored c99 Shells. how to find c99 shell, get c99 shell from google, get free shells from Google, get already uploaded shells from google. download c99 from google, upload c99 shell, c99 shell, backdoor c99.php, get c99.php from google

Google Dorks: Find Already Uploaded Backdoored c99 Shells

Here is the huge list of Dorks to find c99 shells from google. :) :





safe-mode: off (not secure) drwxrwxrwx c99shell
inurl:c99.php
inurl:c99.php uid=0(root)
root c99.php
"Captain Crunch Security Team" inurl:c99
inurl:c99.php
allinurl: c99.php
inurl:c99.php
inurl:"c99.php" c99shell
inurl:c99.php uid=0(root)
c99shell powered by admin
c99shell powered by admin
inurl:"/c99.php"
inurl:c99.php
c99 shell v.1.0 (roots)
inurl:c99.php
allintitle: "c99shell"
inurl:"c99.php
allinurl: "c99.php"
inurl:c99.php
intitle:C99Shell v. 1.0 pre-release +uname
allinurl: "c99.php"
inurl:c99.php
inurl:"c99.php" c99shell
inurl:"/c99.php
inurl:/c99.php+uname
allinurl:"c99.php"
inurl:"c99.php"
allinurl:c99.php
"inurl:c99..php"
c99shell [file on secure ok ]?
powered by Captain Crunch Security Team
allinurl:c99.php
"c99.php" filetype:php
allinurl:c99.php
inurl:c99.php
allinurl:.c99.php
"inurl:c99.php"
c99. PHP-code Feedback Self remove
allinurl:c99.php
download c99.php
allinurl:c99.php
inurl:c99.php
allinurl: "c99.php"
intitle:C99Shell v. 1.0 pre-release +uname
allinurl:"c99.php"
inurl:c99.php
safe-mode: off (not secure) drwxrwxrwx c99shell
c99.php download
inurl:c99.php
c99shell filetype:php -echo
inurl:"c99.php"
inurl:c99.php uid=0(root)
allinurl:c99.php
inurl:"/c99.php" intitle:"C99shell"
C99Shell v. 1.0 pre-release build #5
--[ c99shell v. 1.0 pre-release build #16
c99shell linux infong
C99Shell v. 1.0 pre-release build
!C99Shell v. 1.0 beta!
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
!c99shell v. 1+Safe-mode: OFF (not secure)
"C99Shell v. 1.0 pre-release build "
intitle:c99shell +filetype:php
inurl:c99.php
intitle:C99Shell v. 1.0 pre-release +uname
intitle:!C99Shell v. 1.0 pre-release build #16! root
!C99Shell v. 1.0 pre-release build #5!
inurl:"c99.php"
C99Shell v. 1.0 pre-release build #16!
intitle:c99shell intext:uname
allintext:C99Shell v. 1.0 pre-release build #12
c99shell v. 1.0 pre-release build #16
--[ c99shell v. 1.0 pre-release build #15 | Powered by ]--
allinurl: "c99.php"
Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove Logout
"c99shell v 1.0"
ftp apache inurl:c99.php
c99shell+v.+1.0 16
C99Shell v. 1.0 pre-release build #16 download
intitle:c99shell "Software: Apache"
allinurl: c99.php
allintext: Encoder Tools Proc. FTP brute Sec. SQL PHP-code Update Feedback Self remove
intitle:c99shell uname -bbpress
intitle:"index.of" c99.php
inurl:admin/files/
intitle:"index of /" "c99.php"
intitle:"index of" intext:c99.php
intitle:index.of c99.php
intitle:"index of" + c99.php
intitle:index/of file c99.php
intitle:index/of file c99.php
index of /admin/files/
intitle:"Index of/"+c99.php
c99.php "intitle:Index of "
intitle:index.of c99.php
img/c99.php
intitle:index.of c99.php
img.c99.php
intitle:"Index of/"+c99.php
"index of /" c99.php
c99.php
intitle:"Index of" c99.php
"index of" c99.php
"Index of/"+c99.php 


Read more

What is a Internet Cookie(HTTP) and its Types






What are Different types of Cookies And their Uses: Today we will discuss about What are Different types of Cookies(HTTP) And their Uses. Before learning about types of cookies you have to learn what is a Cookie.


What are Cookies?

A cookie is information that a Website puts on your hard disk so that it can remember something about you at a later time. (More technically, it is information for future use that is stored by the server on the client side of a client/server communication.)  Using the Web's Hypertext Transfer Protocol (HTTP), each request for a Web page is independent of all other requests. For this reason, the Web page server has no memory of what pages it has sent to a user previously or anything about your previous visits. A cookie is a mechanism that allows the server to store its own information about a user on the user's own computer.




What are Different types of Cookies And their Uses



#1 Session cookie

A session cookie upto certain hours,depending on website. After the session hour, it will be destroyed.

#2 Persistent Cookie

A persistent cookie will outlast user sessions. If a persistent cookie has its Max-Age set to 1 year, then, within the year, the initial value set in that cookie would be sent back to the server every time the user visited the server. This could be used to record a vital piece of information such as how the user initially came to this website. For this reason, persistent cookies are also called tracking cookies or in-memory cookies.

#3 Secure cookie

Secure cookies are encrypted cookies. If you used HTTPS(secure Connection), then it will store the cookies in encrypted format. Even hackers steal the cookie, he is able to see only the encrypted data.
Example:
Bank websites always use Secure Cookies.

#4 HttpOnly cookie

The HttpOnly cookie is supported by most modern browsers. On a supported browser, an HttpOnly session cookie will be used only when transmitting HTTP (or HTTPS) requests, thus restricting access from other, non-HTTP APIs (such as JavaScript). This restriction mitigates but does not eliminate the threat of session cookie theft via Cross-site scripting.[15]. It is important to realize this feature applies only to session-management cookies, and not other browser cookies.

#5 Third-party cookie

Third-party cookies will store the cookies with another domain.
For Example:
http://www.example.com will store the cookies with ad.advertise12.com
At the same time, another website also set cookies with same domain.
http://www.othersite.com will store the cookies with ad.advertise12.com

#6 Supercookie

A "supercookie" is a cookie with a public suffix domain, like .com, .co.in,.in.
Most browsers, by default, allow first-party cookies—a cookie with domain to be the same or sub-domain of the requesting host. For example, a user visitinghttp://www.example.com can have a cookie set with domain http://www.example.com or .example.com, but not .com. A supercookie with domain .com would be blocked by browsers; otherwise, a malicious website, like attacker.com, could set a supercookie with domain .com and potentially disrupt or impersonate legitimate user requests to example.com.

#7 Zombie cookie

A zombie cookie is any cookie that is automatically recreated after a user has deleted it. This is accomplished by a script storing the content of the cookie in some other locations, such as the local storage available to Flash content, HTML5 storages and other client side mechanisms, and then recreating the cookie from backup stores when the cookie's absence is detected.

What is the use of Cookies?

  • Session management

    Cookies may be used to maintain data related to the user during navigation, possibly across multiple visits. Cookies were introduced to provide a way to implement a "shopping cart" (or "shopping basket"), a virtual device into which users can store items they want to purchase as they navigate throughout the site.

  • Personalization

    Cookies may be used to remember the information about the user who has visited a website in order to show relevant content in the future. For example a web server may send a cookie containing the username last used to log in to a web site so that it may be filled in for future visits.
  • Tracking

    Tracking cookies may be used to track internet users' web browsing habits. This can also be done in part by using the IP address of the computer requesting the page or the referrer field of the HTTP request header, but cookies allow for greater precision





Read more

Minggu, 19 Juni 2016

11 Aplikasi Software Hacker Yang Terkenal di Dunia


1. Active password Changer

Dengan tools ini, Anda bisa mengubah passaword yang ada di dalam komputer yang bisa anda akses secara fisik. Tool ini bekerja dengan cukup baik. Ada beberapa fitur yang dimilikinya, yaitu melakukan booting dari USB, Floopy disk, ataupun melalui CD. Bahkan tool ini juga menyediakan CD Burner sederhana untuk mem-burn file pada CD.

2. Cain

Ini adalah salah satu tool yang sangat popular dikalangan para Hacker. Aplikasi ini dikenal sebagai aplikasi serba bisa, bukan hanya saja digunakan untuk melakukan kracking password, fitur-fitur lainnya juga bisa didapatkan di sini, seperti MITM. Aplikasi ini memungkinkan agan-agan untuk memperoleh nilai hash dari berbagai sumber.

3.dumpacl-dumpsec

Tools yang digunakan untuk melakukan pekerjaan enumerasi. Dulu, aplikasi ini bernama Dump ACL. Cara kerjanya memanfaatkan Null Connections, sehingga tools ini mampu menampilkan user account secara detail. Contohnya seperti kapan terakhir pergantian atau perubahan password, administratornya siapa dan kapan expirednya dan sebagainya

4.Handy-keylogger

Sama seperti keylogger yang lain, ia juga bisa menyembunyikan dirinya jika dideteksi dari Task Manager. Keylogger ini diam-diam mencatat seluruh kegiatan agan pada PC yang sudah diinstal aplikasi ini. Seperti ketikan keyboard, clipboard, snapshot, dan alamat website yang dikunjungi semua bisa direkam dengan baik menggunakan aplikasi ini.

5. L0phtkrack Administrato

Dengan aplikasi ini , agan bisa mengimmpor nilai hash dari computer lain dengan menggunkan salah satu fitur yang dimilikinya yaitu import hashes. Namun agan skalian masih harus memiliki user account yang setara dengan administrator. Jika agan ingin mengambil nilai hash secara remote.


6. privacy keyboard
Aplikasi tool ni berguna untuk mencegah keylogger yang menyakiti sistem agan skalian. Baik itu keylogger yang bekerja secara hardware maupun software. Jika aplikasi ini aktif Anda tidak bisa melakukan kegiatan capture screen shoots, keystroke. Untuk keylogger berjenis hardware, aplikasi ini menyediakan keyboard virtual, sehingga tidak akan terdeteksi.


7. Spytech Spy Agent


Aplikasi mata-mata ini akan mencatat semua informasi yang dilakukan oleh user secara diam-diam. File logyang digunakan untuk menyimpan hasil pencatatan akan di enkripsi. Secara default, hotkey untuk menjalaknnya aplikasi ini adalah Ctrl+Shift+Alt+M, namun defalt hotkey ini masih bisa anda ubah sesuai dengan keinginan Agan-agan sekalian8.winfingerprint-0.6.2

Aplikasi ini menggambungkan banyak teknik enumerasi. Di aplikasi ini anda bisa menjumpai enumerasi melalui Net BIOS, SMB, MSRPC, SNMP, dan Active Directory. Anda tinggal memasukkan alamat IP dari host yang hendak periksa dan pilih tombol scan untuk mulai melakukan scanning. Setelah itu, terserah agan-agan mau diapain tuhkomputr remote tersebut.9. Sams Big Play Maker
Aplikasi yang satu ini cukup unik karena mampu menyembunyikan teks atau pesan tersembunyi yang anda masukkan menjadi layaknya bentuk percakapan. Biasa mereka tidak akan menyadari bahwa sesungguhnya ada pesan tersembunyi di dalamnya.


10. Track eraser Pro

Dalam urusan menghapus jejak, aplikasi ini memang sangat bisa diandalkan, karena ia mendukung banyak sekali jenis aplikasi. Selain bisa menhapus log yang dicatat oleh Windows, aplikasi ini akan menghapus jejak pada aplikasi Office, realone player, media player, winzip, winamp, dan sebagainya. Dijamin gan-agan tidak akan meninggalkan jejak di PC lain.

11. Actual Spy
Aplikasi ini memilki fitur pencatatan yang cukup lengkap. Key stokes, screen shots, aplikasi yang dijalankan atau ditutup, informasi clipboard saat melakukan copy-paste dokumen yang dicetak dan segala macamnya, dicatat pada masing-masing tabulasi. File log akan dienkripsi sehinggga hanya orang tertentu saja yang bisa melihatnya dan memilih aplikasi diinginkannya.







Read more

Sabtu, 18 Juni 2016

Film Whiskey Tango Foxtrot (2016) Full Movie


Film Whiskey Tango Foxtrot (2016) Full Movie
Film Whiskey Tango Foxtrot (2016) Full Movie
Film Whiskey Tango Foxtrot (2016) Full Movie

Kalaauu mau download filmnya pakai IDM ( internet download manager )

Link IDM : https://www.internetdownloadmanager.com/

Link Film Whiskey Tango Foxtrot (2016) Full Movie : https://www.facebook.com/diffamr.diff/videos/1904532749773371/
Read more

Film : Teenage Mutant Ninja Turtles Out of the Shadows (2016) FULL MOVIE ( SUB INDO )


Film : Teenage Mutant Ninja Turtles Out of the Shadows (2016) FULL MOVIE ( SUB INDO )
Film : Teenage Mutant Ninja Turtles Out of the Shadows (2016) FULL MOVIE ( SUB INDO )
Film : Teenage Mutant Ninja Turtles Out of the Shadows (2016) FULL MOVIE ( SUB INDO ) 

LINK : https://www.facebook.com/diffamr.diff/videos/1904097266483586/







Read more