Law governing IT in India


Cyber Law

Dear Pals,

Now that we have gone through many facets of hacking let us figure something out about the law governing Information Technology (IT) in India.

The cyber world is governed by the Information Technology Act, 2000 in India. Read more »



Generating Shellcode using Metasploit


Metasploit
What is Shellcode??

Shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability.  It is called “shellcode” because it typically starts a  shell/command prompt  from which the attacker can control the compromised machine. Read more »



How to find addresses to overwrite EIP??


Metasploit

While developing exploit, we need to overwrite EIP( Extended Instruction pointer) to change the flow of execution of program.

Note: EIP contains the address of the memory which the processor is going to execute.

Generally EIP is overwritten with the address of instructions like jmp esp, call , push ret etc. which point to our shellcode. Read more »



How to remap exe to another exe file??? (Image Hijack)


Imagae Hijack

Do you ever wonder how can you map one exe file to another exe  file ??  For example, if you try to open calc.exe then it will open cmd.exe automatically.
You can easily do it by executing a simple batch program and  can read the inline comments in the code to understand the code.
Read more »



How to hack Google password??


Google Passwork Hack

Hello folks, today I will tell you about one of the password recovery tool. GooglePasswordDecryptor is a free tool to recover your stored password from various application like Gtalk, Picassa, Desktop Search, Gmail Notifier,Internet explorer and Google Chrome. Read more »



Want to hack passwords in Firefox??


Most of us use Firefox password manager to store our passwords. When we enter our user name and password in some website then Firefox gives us three options: “Remember me” ,” Never for this site” and “not now”. When we click “Remember Me” the current user name and password is stored in following two files: Read more »