Monday, October 19, 2009

Hungry Hacker’s Toolkit >>>

 

Hungry Hacker’s Toolkit
Hello Friends,
Happy Diwali and a prosperous New Year to all of you. This Diwali we are going to give you very Special Gift. We are starting a new Article Series. Every week we will be posting a new Hacking Software which you can Download add to your Hacking Toolkit. We will try to explain each and every aspect of the software to make it easy for you use it.
The 1st Tool of this Special Hacking Toolkit is :  
Kon Boot – Resets Windows and Linux Admin Passwords
Read the full story »

Recent Posts

[13 Oct 2009 | One Comment | ]
Recover Deleted SMS from SIM or Phone Memory for Free Have you ever deleted a very important SMS which you regret for the rest of your life? Are you searching for a free SMS recovery Software? If the answer to above questions is Yes then you don’t have to worry anymore as today I will show you how to recover deleted SMS from SIM card or Phone memory.
[22 Sep 2009 | 2 Comments | ]
How to open Tabs in Notepad? Are you tired of opening new instance of Notepad everytime you open a new Text Document? If the answer to the above question is Yes then you don’t have to worry about this anymore. You can use NotepadTabs to open different Text Documents in the same instance in form of Tabs as in Firefox.
[19 Sep 2009 | 14 Comments | ]
Hungry Hacker T-shirt Design Finalised As you all know that We are celebrating the Hungry Hacker’s 2nd Anniversary and we are going to give away T-shirts, Rapidshare Premium Accounts and Kaspersky Keys to the users of Hungry Hacker.
Today we are going to release the Design of the T-shirt, which will be given away as gift to the Selected Users.
[11 Sep 2009 | 4 Comments | ]
Hacking With Nmap – The Network Mapping Tool Nmap is most widely used port scanning & network mapping tool used widely by network administrators & security administrators to scan their ports for potential vulnerabilities. If you are not aware ofNmap & you don’t have it then you can download it here for both Linux & Windows.
[11 Sep 2009 | One Comment | ]
Oracle Hacking Tool Released Open source security testers have released a free tool that simplifies and automates hacking of Oracle databases at the Black Hat conference in Las Vegas in July 2009.

The hacking tool was developed in the open source Metasploit cooperative, which had hosted a seminar at the conference.
[7 Sep 2009 | 5 Comments | ]
Top 10 facebook Hacks You all know we are celebrating the month of September as the Anniversary month of Hacking Truths. As per the promise made by us that this month is going to be special and so here we are with the first gift to all of you.
Facebook has become very famous in last 1 year. Orkut which was considered to be the best Social networking website has been sidetracked by emerging Social Networking Websites like Facebook and Twitter. Considering the popularity of Facebook we have collected the Most Essential Hacks of Facebook and presented them to you.
[2 Sep 2009 | No Comment | ]
Mapping The Network Of A Victim Organization While performing White Box, The ethical hackers know about how network is managed, how it is organized all the little details are also known to ethical hacker, who is performing the penetration testing on the victim network.
But, Case is reverse in Black Box Testing, Ethical hacker is kept a way outside the organization & he could not even gett that details directly. So what he do is first perform passive attack gathering & collect some information, then he arranges all the information in particular order so as to predict the hierarchy of the network.
[1 Sep 2009 | 75 Comments | ]
Happy Birthday Hungry Hacker! Hello Friends,
I am very happy to announce that we have completed 2 Successful years of “Hacking Truths” and this would not have been possible without your Love and Support. In this year from 1st Sept 2008 to 31st Aug 2009 Hungry Hacker has seen lots of Ups and Downs and it has managed to come out of all the problems with increased Confidence. Hungry Hacker has tried its best to provide most updated and most effective information to all its users. To Celebrate this Occasion we have decided to make this Anniversary very special by making you a part of this Celebration and giving away lots and lots of Prizes. This month of September is going to be Celebrated as Anniversary Month and we will be distributing Daily Prizes to the Subscribers of our Blog so don’t missout on this oportunity.
[27 Aug 2009 | 12 Comments | ]
Introduction of new writer: Zell Hello Hungry Hackers. My name is Zell Faze, and I have been recently taken on as a writer for Hungry Hackers. Before I write any articles about hacking, I want to take a few minutes of your day to tell you a bit about myself. I think you always ought to know a bit about your mentor.
[18 Aug 2009 | One Comment | ]
Gathering Information About Your Victim In Penetration Testing The very first stage of hacking is PAG i.e Passive Attack Gathering. In plain English we collect all the information about our victim network or a system for planning the attack. Remember following things are explained for a penetration testing scenario & not for hacking actual hacking. So don’t misuse this information, team of hacking truths will not be responsible for anything you do with it.

No comments:

Post a Comment