0
WEP and WPA-PSK wifi cracking toolWEP and WPA-PSK wifi cracking tool

Aircrack-ng (a fork of aircrack) is my main tool for cracking Wi-Fi passwords. It has a wireless network detector, a packet sniffer, WEP and WPA/WPA2-PSK cracker, and an analysis tool for 802.11 wireless LANs. Aircrack-ng works with any wireless card…

Read More..

0
How to disconnect any wifi devices from networkHow to disconnect any wifi devices from network

Netcut is mostly used to disconnect any wifi device from network and Find any IP/Computer/network devices/Phone/Xbox/PSP/PS3/Wii/Ipad anything using netcut tool.The driver and Install package has been upgrade. tested working under windows 7 both 32 b…

Read More..

0
Wifi hacking Using BacktrackWifi hacking Using Backtrack

Step 1:-First Download Backtrack  from the following link:http://www.remote-exploit.org/backtrack_download.htmlStep 2:-Burn the iso image on CD and boot your laptop from CD driveStep 3:-Select the third boot option(VESA/KDE).Step 4:-Once in BT3, clic…

Read More..

0
Telnet commandTelnet command

Telnet is a program which runs on TCP/IP.Using it we can connect to the remote computeron particular port. When connected it grabs thedaemon running on that port.The basic syntax of Telnet is (at commandprompt)--c:/>telnet hostname.comBy default teln…

Read More..

0
Netstat commandNetstat command

It displays protocol statistics and current TCP/IPnetwork connections. i.e. local address, remoteaddress, port number, etc.It's syntax is (at command prompt)--c:/>netstat –n …

Read More..

0
Ping CommandPing Command

Ping is part of ICMP (Internet Control Message Protocol)which is used to troubleshoot TCP/IP networks. So, Pingis basically a command that allows you to check whetherthe host is alive or not.To ping a particular host the syntax is (at commandprompt)-…

Read More..

0
Best Password Cracking MethodsBest Password Cracking Methods

Top Ten Password Cracking Methods1. Dictionary attack"This uses a simple file containing words that can, surprise surprise, be found in a dictionary. In other words, if you will excuse the pun, this attack uses exactly the kind of words that many peo…

Read More..

0
Windows Event Viewer Most important TrickWindows Event Viewer Most important Trick

Do you want to know whether your PC was used in your absence?Just follow these simple steps:1:Goto Run and type eventvwr.msc in the Run dialog box.2:Events are stored in three log files: Application,Security, and System. These logs can be reviewed an…

Read More..

0
ID card creator SoftwareID card creator Software

Advanced ID Creator:Advanced ID Creator skilled is a simple to use nonetheless powerful software system resolution developed to assist you style ID cards and badges employing a terribly intuitive interface.And this intuitive interface is strictly the…

Read More..

2
Mostly Use KeyloggersMostly Use Keyloggers

           Here is mostly top keyloggers.!!!1:REFOG Free Keylogger:Who Is It For?Concerned parents all over the world use Refog Free Keylogger to protect their kids. The free keyboard monitoring tool intercepts keystrokes and decodes chat conversatio…

Read More..
 
123 ... 123»
 
Top