April 11, 2013

What is 94fbr?

Most of the software are available for trial version after trial version we are looking for crack, serial no, keygen, patch and most of us don’t known where to get Serial No & wasted the lot’s of time for searching on google. So today I’ll tell you a useful method for serial key of any software.Go to Google and type Same as below:-
94fbr idm
94fbr nero
94fbr avast
proxifier 94fbr
etc

we can use 94fbr in both types either 94fbr followed by software name or software name followed by 94fbr.
94FBR was part of a Microsoft Office 2000 product key that was released on the internet that bypassed Microsoft’s activation system.Because it is a relatively uncommon term, when you add it to your search queries, it will generally return results of pages listing illegal serial numbers.

Source

August 09, 2012

Create EXE Backdoor Using Metasploit

Embedding backdoor into EXE files is an important step in order to learn how to hack any windows system (xp, vista or seven) and the good thing is that easy .. you can follow the video tutorial.



July 02, 2011

ARP Poisoning with Ettercap + Video

 Ettercap is a suite for man in the middle attacks on LAN (local area network ). It features sniffing of live connections, content filtering on the fly and many other interesting tricks.It supports active and passive dissection of many protocols (even ciphered ones) and includes many feature for network and host analysis. In this tutorial i will explain how to sniff (user names,passwords) in LAN using Ettercap


May 14, 2011

Metasploit Framework 3.7.0 Released!

The Metasploit team has spent the last two months focused on one of the least-visible, but most important pieces of the Metasploit Framework; the session backend. Metasploit 3.7 represents a complete overhaul of how sessions are tracked within the framework and associated with the backend database. This release also significantly improves the staging process for the reverse_tcp stager and Meterpreter session initialization. Shell sessions now hold their output in a ring buffer, which allows us to easily view session history -- even if you don't have a database.