THE NEXT GENERATION OF COMPUTING

The ComputerManiac is for those who are Craze about computers.

HACKERS ARE HERE

ComputerManiac is connected to the ChennaiHackers community.

FIND EVERYTHING HERE

Feel free,This the platform for computer experts.

JOIN US

CONNECT WITH EXPERTS TO BECOME AN EXPERT

ASK US

FEEL FREE TO REACH US

Monday, 19 November 2012

SSL Strip using Backtrack

SSL Strip is a tool that hijacks HTTP traffic on a network by replacing all the HTTPS/SSL links with HTTP ones. Once SSL Strip is setup all the victim traffic will be routed through the attacker and HTTP traffic will be redirected to the attacker machine. The attacker will be able to obtain all logon information by sniffing the HTTP plaintext protocol. How to: 1. Set up IP Forwarding echo 1 > /proc/sys/net/ipv4/ip_forward 2. Set up Port...

Wednesday, 14 November 2012

Pentest lab

Pentest lab vulnerable servers-applications list In this post I’m going to present some useful resources to learn about penetration testing and where to use exploitation tools and techniques in a safe and legal environment. This list contain a set of  deliberately insecure LiveCDs, Virtual machines and applicarions designed to be used as targets for enumeration, web exploitation, password cracking and reverse  engineering. If...

Tuesday, 13 November 2012

Comptia N+ Ebook

LESSON 1: Basic Network Theory Network Definitions Network Models Connectivity Network Addressing Signaling Concepts LESSON 2: Network Connectivity The Data Package Establishing a Connection Reliable Delivery Network Connectivity Noise Control Building Codes Connection Devices LESSON 3: Advanced Network Theory The OSI Model Ethernet Network Resources Token Ring/IEEE 802.5 FDDI Wireless Networking LESSON 4: Common Network Protocols Families...

Thursday, 8 November 2012

Kaspersky full version activator

Kaspersky activator DOWNLOAD HERE ...

Saturday, 3 November 2012

Havij Tutorial-Website Hacking

Havij Tutorial-Website Hacking   it is simple tut how to use havij to hack sites                                                                                                                      ...

Hack Website

Upload Shell and Deface a Website What we need: 1-A Shell (Will be provided) 2-A website vulnerable to SQLi 3-Image or File upload area on that Vulnerable website So firstly download the shell here. Download What is Shell ? A shell script is a script written for the shell, or command line interpreter, of an operating system. It is often considered a simple domain-specific programming language. Typical operations performed by...

Online hacking Tools

Online Tools Footprinting  Nmap Online IP Locator Traceroute WayBack Machine Whois Lookup Ascii Table Hash Cracking MD5 NTLM SHA1 Converters Binary Translator...

Ethical Hacking Syllabus overview

Certified Ethical Hacker Certified Ethical Hacker (312-50) CEH 1.CEH Ethics and Legal Issues12.CEH Web Application Vulnerabilities 2.CEH Footprinting 13.CEH Web Based Password Cracking Techniques 3.CEH Scanning 14.CEH SQL Injection 4.CEH Enumeration 15.CEH Hacking Wireless Networks 5.CEH System Hacking 16.CEH Virus and Worms 6.CEH Trojans and Backdoors 17.CEH Hacking Novell 7.CEH Sniffers 18.CEH Hacking Linux 8.CEH...