Category: Hacking

  • How to Crack a Wpa2-Psk Password with Windows

    How to Crack a Wpa2-Psk Password with Windows

    It’s a very common question on the internet to How to hack a Facebook account password and how to hack a WiFi password. Even if you search on YouTube you will find a lot of tutorial to How to hack a WiFi password using backtrack. However, backtrack OS is not the handiest OS for normal…

  • Hacking facebook on wifi LAN part 2

    Hacking facebook on wifi LAN part 2

    I’m back with the second part of the post. At the end of the last post, we successfully re-routed all the traffic from the victim’s computer to the router through our computer. Next, we have to capture their facebook cookies through Wireshark. So How do you go about doing that? It’s very simple actually. Open…

  • Hacking Facebook on local wifi LAN

    Hacking Facebook on local wifi LAN

    A lot of subscribers have been asking me on how to hack Facebook. Well this is the tutorial that will let you hack not just facebook but any site on your local wifi/LAN. Ok so in this post I am going to show you a way you can hack the facebook accounts of all the…

  • Trojan Horse | RAT | Configure and Use | Tutorial- Part 2

    Trojan Horse | RAT | Configure and Use | Tutorial- Part 2

    Just go through the Part 1 which includes the basics of  Trojan Click here. This tutorial is about configuring and using a trojan. There are many trojans available on the internet for free. Some popular ones are Beast, Pro Rat, Netbus, Back Orifice, Girlfriend, Sub 7. I will be using Pro Rat in this tutorial.…

  • Trojan Horse (Basics) – Part 1

    Trojan Horse (Basics) – Part 1

    Have you watched the movie, Troy? Has your wallpaper ever changed automatically? Have the programs ever started without your initiation? Have the browser opened unexpected websites automatically? Simply have you ever felt that someone else is controlling your computer? NO? Congrats, you probably haven’t been a victim of trojan yet :). A trojan horse is…

  • Learn how to Hack Wifi Password

    Learn how to Hack Wifi Password

    This tutorial teaches you how to hack wifi passowrd in just 10 to 15 minutes. This tutorial explains How to Hack or Crack Wifi Password. This hack will work on hacking WEP encryption password. So guys tighten your belts for new hack and lets start hack wifi. STEPS TO HACK WIFI OR WIRELESS PASSWORD 1.…

  • How to easy hack a wordpress site or blog

    How to easy hack a wordpress site or blog

    The answer to this question may be difficult to determine, simply because there are so many ways to hack a site. Our aim in this article to show you the techniques most used by hackers in targeting and hacking your site! Let’s suppose that this is your site: hack-test.com Let’s ping this site to get…

  • How to hack easily a remote computer using Metasploit? Exploiting Java vulnerability CVE-2012-0507

    How to hack easily a remote computer using Metasploit? Exploiting Java vulnerability CVE-2012-0507

    Whenever someone says PenTesting tool, the first thing comes in our mind is MetaSploit . Today, I am going to demonstrate how to use the Metasploit tool to exploit the popular java AtomicReferenceArray Type Violation vulnerability(CVE-2012-0507). About MetaSploit: Metsploit is a very Powerful PenTesting Tool . Metasploit Framework, a tool for developing and executing exploit code…

  • Unleash the power Backtrack 5 with thad0ctor Toolkit

    Unleash the power Backtrack 5 with thad0ctor Toolkit

    The backbone of thad0ctor’s Backtrack 5 Toolkit is the Wordlist Toolkit that contains a plethora of tools to create, modify, and manipulate word lists in order for end users to strengthen their systems by testing their passwords against a variety of tools designed to expose their pass phrases. In short it is the ultimate tool…

  • Start networking in BackTrack 4

    Start networking in BackTrack 4

    So you have installed BackTrack 4 and are ready for hacking, but you can’t connect to the internet.Well, Backtrack won’t start the networking automatically to maintain stealth boot. So, to initiate networking and enabling internet enter the following command: This command will start networking/internet in backtrack.

  • Creating a virus : Tutorial

    Creating a virus : Tutorial

    This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another…

  • Denial of Service (DOS) attack :Tutorial

    Denial of Service (DOS) attack :Tutorial

    A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person or people to prevent an…

  • Find IP of remote computers

    Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. In this post I’ll show you how to find the IP address of a remote computer in simple steps. I…

Ad Blocker Detected!

Please whitelist DailyJag in your adblocker.

Refresh

Log In

Or with username:

Forgot password?

Don't have an account? Register

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.