Da Hacker Forum Forum Index
FAQ  •  Search  •  Memberlist  •  Usergroups  •  Join! (free)   •  Profile  •  Log in to check your private messages  •  Log in

  Da Hacker Forum Forum Index
The time now is Sun Jul 23, 2017 8:38 pm
View unanswered posts

 Hacks
 Forum   Topics   Posts   Last Post 
No new posts Security exploit
A security exploit is a prepared application that takes advantage of a known weakness. Common examples of security exploits are SQL injection, Cross Site Scripting and Cross Site Request Forgery which abuse security holes that may result from substandard programming practice. Other exploits would be able to be used through FTP, HTTP, PHP, SSH, Telnet and some web-pages. These are very common in website/domain hacking.
Moderators editor, cantsay
2908 2908 Sun Jul 23, 2017 5:03 pm
dichvusocksView latest post
No new posts Vulnerability scanner
A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. (Note that firewalls defend computers from intruders by limiting access to ports/machines both inbound and outbound, but can still be circumvented.)
Moderators editor, cantsay
0 0 No Posts
No new posts Password cracking
Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Moderators editor, cantsay
0 0 No Posts
No new posts Packet sniffer Spoofing attack
A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.
Moderators editor, cantsay
0 0 No Posts
No new posts Rootkit
A rootkit is designed to conceal the compromise of a computer's security, and can represent any of a set of programs which work to subvert control of an operating system from its legitimate operators. Usually, a rootkit will obscure its installation and attempt to prevent its removal through a subversion of standard system security. Rootkits may include replacements for system binaries so that it becomes impossible for the legitimate user to detect the presence of the intruder on the system by looking at process tables.
Moderators editor, cantsay
0 0 No Posts
No new posts Social engineering
Social Engineering is the art of getting persons to reveal sensitive information about a system. This is usually done by impersonating someone or by convincing people to believe you have permissions to obtain such information.
Moderators editor, cantsay
0 0 No Posts
No new posts Trojan horse
A Trojan horse is a program which seems to be doing one thing, but is actually doing another. A trojan horse can be used to set up a back door in a computer system such that the intruder can gain access later. (The name refers to the horse from the Trojan War, with conceptually similar function of deceiving defenders into bringing an intruder inside.)
Moderators editor, cantsay
2 2 Tue Jul 12, 2016 2:49 pm
sktverView latest post
No new posts Virus
A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Therefore, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells. While some are harmless or mere hoaxes most computer viruses are considered malicious.
Moderators editor, cantsay
0 0 No Posts
No new posts Worm
Like a virus, a worm is also a self-replicating program. A worm differs from a virus in that it propagates through computer networks without user intervention. Unlike a virus, it does not need to attach itself to an existing program. Many people conflate the terms "virus" and "worm", using them both to describe any self-propagating program.
Moderators editor, cantsay
0 0 No Posts
No new posts Key loggers
A keylogger is a tool designed to record ('log') every keystroke on an affected machine for later retrieval. Its purpose is usually to allow the user of this tool to gain access to confidential information typed on the affected machine, such as a user's password or other private data. Some key loggers uses virus-, trojan-, and rootkit-like methods to remain active and hidden. However, some key loggers are used in legitimate ways and sometimes to even enhance computer security. As an example, a business might have a key logger on a computer that was used as at a Point of Sale and data collected by the key logger could be use for catching employee fraud.
Moderators editor, cantsay
3 5 Thu Apr 25, 2013 1:41 am
AdelaSView latest post
No new posts Tutorials
Want to know how to hack? Go here.
Moderators editor, cantsay
3 5 Tue Aug 10, 2010 4:37 pm
lamsasukeView latest post
No new posts MY SQL
Server hacking Of Mainly crashing databases and tables...
Moderators editor, cantsay
1 1 Mon Aug 09, 2010 12:05 pm
lamsasukeView latest post
No new posts Hacking Experience
What Experience have you had in hacking Post, Below
Moderators editor, cantsay
0 0 No Posts
No new posts Members And Ranks
Ranks of members
Moderators editor, cantsay
1 2 Mon Sep 20, 2010 6:42 pm
Oh Mai GawdView latest post
No new posts Under Construction
Virus,Cracks,Hacks,Injections, Ect in the making!
Moderators editor, cantsay
2 5 Mon Sep 20, 2010 11:02 am
Oh Mai GawdView latest post
No new posts One Time Only's
A list of one time only special announcements.
Moderators editor, cantsay
6 6 Thu Nov 25, 2010 8:28 pm
Oh Mai GawdView latest post
No new posts Welcomes
Here you can introduce yourself to the community.
Moderators editor, cantsay
0 0 No Posts
No new posts hackers.myfreeforum.org (MOVING)
we are moving to a different site that uses VBulletin 4.0.6 with cpanel
   
1 1 Thu Dec 02, 2010 5:59 pm
lamsasukeView latest post

All times are GMT
 Who is Online
Who is Online Our users have posted a total of 2942 articles
We have 17 registered users
The newest registered user is Jameswef
In total there are 3 users online :: 0 Registered, 0 Hidden and 3 Guests   [ Administrator ]   [ Moderator ]
Most users ever online was 8 on Sun Dec 07, 2014 4:46 pm
Registered Users: None
This data is based on users active over the past 1 minutes

 Log in
Username:    Password:      Log me on automatically each visit    

New posts New posts
No new posts No new posts
Forum is locked Forum is locked

Powered by phpBB © 2001, 2005 phpBB Group :: Design by GHS
:: Top
Create your own free forum | Buy a domain to use with your forum