http://aux.iconpedia.net/uploads/10875870971013046993.pnghttp://aux.iconpedia.net/uploads/1540998406962263282.png !

Featured Post 1 Title

Replace these every slide sentences with your featured post descriptions.Go to Blogger edit html and find these sentences.Now replace these with your own descriptions.This theme is Bloggerized by Lasantha - Premiumbloggertemplates.com.Download more free blogger templates from www.premiumbloggertemplates.com.

Read More

Oktober 24, 2011

[+] Online SQLi Scanner List [+]

.fullpost{display:none;} - Online SQLi Scanner List - http://laba-laba.co.cc/vuln_scanner/http://scanner.drie88.tk/http://xaxnerx.byethost13.com/scan.phphttp://www.shad0w.info/sqli.phphttp://h1.ripway.com/TroyH2O/index.php/ http://webhosting.blackoutaio.com/~sqli/http://the-invisible.org/sqli.phphttp://wolfscps.com/gscanner.phphttp://www.izyvn.biz/dork/http://www.shell.20x.cc/SQLi....
(Continue)..

Pasang Backdoor lewat Phpmyadmin (windows)

.fullpost{display:none;} Pasang Backdoor lewat Phpmyadmin (windows) Phpmyadmin adalah perangkat lunak bebas (Open source) yang ditulis dalam bahasa pemrograman php untuk menangani administrasi Mysql. Disini saya akan mencoba menerangkan tentang Backdoor via phpmyadmin pada webserver windows secara rinci!! Yang pasti percobaan lewat localhost di windows…saya menggunakan XAMPP dan phpmyadmin...
(Continue)..

Oktober 07, 2011

Tutorial Error Based SQL Injection [ p0pc0rn ]

.fullpost{display:none;} Error Based SQL Injection ane mau ajar kalian sql injection mnggunakan teknik error based. ada banyak cara untuk lakukan error based nih. so ane ajar yang simple and basic kalian bisa liat di forum2/blog2 sekuriti/hacking. thanks to rozalman dia ade kasik satu web so aku leh jadikan sbg example. before proceed take note,time bila kita leh gunakan teknik nih? target testing...
(Continue)..

Oktober 05, 2011

Windows Rooting System

.fullpost{display:none;} Hello guys this tutorial is dedicated to the members of JH.Today am gonna speak about Windows Rooting System or how to gain RDP Access. Well this is diffirent from *Unix process there we use exploit here we use only commands and yes if we are not able to execute those commands we can try some alternativ but still the possibilitys to work are really low....Am gonna...
(Continue)..

Pages 171234 »