Posts Tagged ‘Hacking’

Hacking ipod headphone controller for use with Android

Posted: May 30, 2012 by HACKERSROAD in Hacking
Tags:

Getting access to some of the CCTVs

Posted: May 30, 2012 by HACKERSROAD in Hacking
Tags:

Parikshit Prasai's Blog

well, this is not a particularly new topic and not exactly a magnificent achievement, but yeah, you can take control of some CCTVs around the world and google helps you do that! Just follow the following steps:

1. Fire up google.com

2. Search for : “inurl:view/index.shtml” (without quotes ofcourse)

3. Search for your desired link.

4. Watch.

 

You can even take complete control of some cameras. You can pan them, zoom in or zoom out, adjust retina, toggle nightvision on (if available), take a snapshot, and all other sorts of thing. This is not exactly legal, and I will not be held responsible for any mischief you perform!

 

Happy spying!

View original post

Tweaking With Arpit

 

There are lots of tutorials available on the internet related to hacking but the big problem lies in testing your theoretical skills. Unless you don’t have practical exposure to hacking, you cannot really understand the strength of it. The technique I will discuss here will be advantageous for those who have only single system and want to set up a testing network using it. In case you have multiple systems then you can easily test for your skills by making one system as target and other as attacker.

pentesting-lab-mainscreen

 

But what to do when we have only a single system at our disposal. Need not to worry. Virtual machine is the ultimate solution. You can set up your own hacking network and apply your skills to gain practical exposure to hacking.

The only thing to look for is your systems hardware configuration. You should have minimum 2 GB RAM…

View original post 1,021 more words

Google search tips for hacking

Posted: May 14, 2012 by HACKERSROAD in Hacking
Tags:

தேடினேன் வந்தது...!

To prevent your password from being hacked with social engineering, brute force or dictionary attack method, you should notice that:

1. Do not use the same password on multiple accounts.

2. The password should contains at least 20 characters, it should consists of both numbers, letters and special symbols.

3. Do not use the names of your families, friends or pets.

4. Do not use postcodes, house numbers, phone numbers, birthdates, ID card numbers, social security numbers, etc.

5. Do not use the most commonly used English words.

6. You should not let your browsers( FireFox, Chrome, Opera, IE, Safari ) or FTP client programs save your passwords, any password saved in the browser can be revealed with a simple click using a script.

7. Do not login important accounts with a public computer or a machine of other guys.

8. Do not login important accounts with HTTP or FTP connections…

View original post 93 more words