Share |
--- Welcome To Sky Net - The Organization of Hackers ---

Friday, August 26, 2011

E-Mail and SMS Bomber

Download :




Code:

BlueTooth Hacking Tools


This is a lis of the essential Bleutooth hacking tools, mostly for the Linux
platform, that can be used to search out and hack Bleutooth-enabled
devices.
Discovering Bleutooth Devices
BlueScanner – BlueScanner searches out for
Bleutooth-enabled devices. It will try to extract as much information
as possible for each newly discovered device. Download BlueScan.
BlueSniff – BlueSniff is a GUI-based utility for finding discoverable and hidden Bleutooth-enabled devices. Download BlueSniff.
BTBrowser – Bleutooth Browser is a J2ME application that
can browse and explore the technical specification of surrounding
Bleutooth-enabled devices. You can browse device information and all
supported profiles and service records of each device. BTBrowser works
on phones that supports JSR-82 – the Java Bleutooth specification. Download BTBrowser.

Password Hacking Methods - Part II

3) Default Passwords:- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.

Always disable or change the applications' (both online and offline) default username-password pairs.

4) Brute Force:- 
If all other techniques failed, then attackers use brute force password cracking


The Best Operating System for Hackers


The Best Operating System for Hackers 
Before i post this, i was posted the link download of Back Track 5There are a couple of things that are essential to any hacker’s walk of life. To name a few, there’s the ubiquitous flash drive for data transfer. You have the crossover cable for even faster data transfer. There’s the Wi-Fi antenna for high gain and strong amplification. Possibly, you might find a video capture card in the computer. Of course, there’s the ubiquitous laptop and desktop computer. But what software is on these computers? Undoubtedly, you will find at least two operating systems, most often Windows and Linux. But with Linux, there are several different distributions. Is there a specific one? With hackers and crackers, there is only one Linux distort out there. It is called Backtrack.

BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking.

Password Hacking Methods - Part I

Password Hacking
Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :

1) Hashing:- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.

Bermain dengan Google


Have Fun With Google


Hello friends there is some trick for you.
STEP#1 Go to google.com
STEP#2 Type in google "google sphere".
STEP#3 Click on "I'm Feeling Lucky".
STEP#4 Move your cursor.
You can also try it with typing "google gravity" on google.

IN INDONESIA :
Pertama buka Google.com / Google.co.id
Kedua Ketik "Google Sphere" di kolom pencarian
Ketiga Klik "Saya sedang beruntung"
Keempat Gerakkan mouse mu dan lihat lah
Anda juga bisa mengetikkan "Google Gravity"

Best 8 Crypters Download



8 Software Crypers terbaik
CRYPTERS! Download
  • GRINGOCRYPT
  • COOD'S CRYPTER
  • UD CRYPTER
  • FLYCRYPTER
  • CARBON CRYPTER
  • BRM CRYPTER
  • ANOTHER CRYPTER
  • NUFCRULE3_CRYPTER