Share |
--- Welcome To Sky Net - The Organization of Hackers ---

Friday, August 26, 2011

Bermain dengan Google


Have Fun With Google


Hello friends there is some trick for you.
STEP#1 Go to google.com
STEP#2 Type in google "google sphere".
STEP#3 Click on "I'm Feeling Lucky".
STEP#4 Move your cursor.
You can also try it with typing "google gravity" on google.

IN INDONESIA :
Pertama buka Google.com / Google.co.id
Kedua Ketik "Google Sphere" di kolom pencarian
Ketiga Klik "Saya sedang beruntung"
Keempat Gerakkan mouse mu dan lihat lah
Anda juga bisa mengetikkan "Google Gravity"

Best 8 Crypters Download



8 Software Crypers terbaik
CRYPTERS! Download
  • GRINGOCRYPT
  • COOD'S CRYPTER
  • UD CRYPTER
  • FLYCRYPTER
  • CARBON CRYPTER
  • BRM CRYPTER
  • ANOTHER CRYPTER
  • NUFCRULE3_CRYPTER

Setting Backdoor in Windows | Command Prompt On Logon Screen

Lets assume that you have just cracked victim's windows password.  or simply got access to his windows for some time.Can you make some changes in windows so that you could access the windows again even if victim changes the password ?? or Can you make any changes in your own windows so that you could access it anytime even if anybody sets/changes password ?
Simply Can we set a backdoor in windows ?
Yes we can :) .
Backdoor actually means maintaining access.
okay lets do one thing first. Open your command prompt (run as administrator in win 7/vista).

Type the following command :

Syntax : net user account.name *
Example: net user administrator *
and hit enter. Set any password for that account.





Hopefully your new password must have been set. did you notice one thing ? It didn't ask you to confirm old password. Now suppose if anyhow we manage to access command prompt at logon screen (without logging in), we can easily change/clear password.  
Okay lets move on.

GOOGLE DORK FOR SQLI INJECTION

you can find vuln. site and you are ready to Sql injection.
PHP DORK
THIS IS THE LISTinurl:(0x3a,version
inurl@version,0x3a,databse)
inurl:(user,0x3a,pass)
inurl:+union+select+ from
inurl:+union+select+ pass
inurl:+union+select+ SHOP
inurl:+union+select+ admin
inurl:index.php?id=
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurl:play_old.php?id=
inurl:declaration_more.php?decl_id=
inurl:pageid=
inurl:games.php?id=
inurl:page.php?file=
inurl:newsDetail.php?id=

SQL Injection | Step by Step deface website

[IF U ARE INDONESIAN PEOPLE OR OTHER , USE THE TRANSLATE TOOLS ON THE RIGHT SIDE]
What is SQL injection ?

SQL stands for Structured Query Language. It is very high level language,I mean close to humans.
Like SELECT,INSERT,DELETE,UPDATE queries are used to select,add data,delete data,update data
respectively.SQL is used to
design the databses. The information is stored in databses.
SQL injection is the vulnerability occuring in database layer of application which allow attacker to see
the contents stored in database. This vulnerabilty occures when the user's input is not filtered or
improperly filtered.Example the webpages links in format 
www.anything.com/something.php?something=something, example 
www.tartanarmy.com/news/news.php?id=130.
Here we are passing 130 to database and it returns the results accordingly. Lets attach a single quote at the end (') that is
www.tartanarmy.com/news/news.php?id=130'
and we got an error on the screen because it included the single quote (') while processing the results. It assures us that it didn't filter our input and is vulnerable to attack.



Some basics-:
Every database server has databases on it. Every database has tables in it, tables have columns in it and finally data is stored in columns.


How to Get a Dual SIM Card for the Same Number




ds_b23c3040-f124-43ac-90aa-b4b66f432fe0
Jean Asta
Jean Asta has been a freelance writer for domestic and international clients since 2005. She also acts as a training consultant to businesses and nonprofit organizations in the southeast United States. Asta holds a Master of Public Administration with a concentration in nonprofit management and a Bachelor of Arts in English literature, both from the University of Georgia.
updated: December 02, 2010
How to Get a Dual SIM Card for the Same Numberthumbnail
You can create a second SIM card with the same number from an older SIM card.
There are two types of SIM cards in use today: V-1, or pre-2001 SIM cards, and V-2, or post-2001 SIM 

Maintenance


besok blog ini akan mengadakan maintenance selama 5 jam
Di mulai dari jam 12 P.M (GMT +7)
kami mohon maaf atas gangguan ini
maintenance ini diadakan untuk perpindahan domain ke domain .CO.NR atau mungkin saja .COM
Semoga maintenance ini berhasil
in english :
tomorrow this blog will hold maintenance for 5 hours
At the start of 12 hours P.M (GMT +7)
We apologize for the inconvenience
maintenance is held to transfer the domain to domain. CO.NR or maybe .COM
Hopefully this maintenance work