Browsing All Posts filed under »Hacking«

Hacking the “HAMA” Device.

January 5, 2010 by


This post is about interfacing a strange device. It has two connectors. 1. An European power plug and 2. A DB-25 Connector. And I guess you have to connect it to the serial to interface it!…and while plugging it in you have to convert the DB25 to DB9 and put it into the COM2 of […]

Chaining Proxies and Wingates!!!

December 29, 2009 by


Hello!… All you wonderful people out there. 🙂 …Yes!…I’m back in action and it’s been long..very long! since I’ve posted on anarchia..actually to be honest I felt very Handycap and so empty….Well… you all must be wondering where have I disappeared??…LoL!…don’t worry I’ve been around but just been busy with University work and just completing […]

Wireless Networking for Paranoid Hackers!

December 7, 2009 by


Implementing Basic Wireless Security. We’ve all done it…we’ve all seen the lack of confidence that wireless networking has brought our world. It’s a new frontier and there are open doors wherever we turn. Fewer among us are those who have actually sat down and broken an 802.11b WEP key. Though its time consuming it can […]

Windows File System!

December 7, 2009 by


The windows File system starts with the Boot Sector. This is complete each time you format an NTFS volume and its situated in the first sector of your windows partition. The boot sector holds information about the drive which is recorded in the BIOS parameter block (repeatedly called as BPB). The BPB details information about […]

Hacking Hotmail through XSS!!!

December 5, 2009 by


Microsoft codes are not always secure and to be very clear once again… with this XSS exploit. This is not the first XSS exploit that has been found others before it can attest it. How this is done?  Its very simple, when you are logged into Hotmail…a cookie is formed which easily allows you to […]

Database Servers.

December 2, 2009 by


Databases have been the heart of a profitable website. An attack on the database servers can cause a immense economic loss for the company. Database servers are usually hacked to get the credit card information. And just one hack on a profit-making site will bring down its name and also the customers as they also […]

Port Scanning exposed!

November 30, 2009 by


Note: please read the Disclaimer before continuing Environment: Visual C++, WinXP onwards Introduction There are various port scanners that use a simple method of scanning. These applications work at the application level and are quite slow. This scanner is faster than a normal scanner. It is based on the TCP Half Open Scanning or TCP […]