Monday 4 August 2014

Disruptive Technology : Hide keyloggers in a .jpg file

Disruptive Technology : Hide keyloggers in a .jpg file:                               Hide keyloggers in a .jpg file                          Note : Only For Educational Purpose.>...

Disruptive Technology : premiun acccounts

This summary is not available. Please click here to view the post.

Disruptive Technology : HOW TO CRACK ANY TYPE OF SOFTWARE PROTECTION

Disruptive Technology : HOW TO CRACK ANY TYPE OF SOFTWARE PROTECTION: HOW TO CRACK ANY TYPE OF SOFTWARE PROTECTION In this tutorial you will learn how to crack any type of software protection u...

Disruptive Technology : Delete An undeletable File:

Disruptive Technology : Delete An undeletable File::                    Delete An Undeletable File Open a Command Prompt window and leave it open. Close all open ...

Disruptive Technology : How to make HOTSPOT IN WiNDOWS 8

Disruptive Technology : How to make HOTSPOT IN WiNDOWS 8:                      How to make HOTSPOT IN WiNDOWS 8        STEP 1:      FIRSTLY DOWNLOAD WIFI HOTSPOT PRO FOR WIN 8 FROM THE...

Disruptive Technology : HOW TO BLOCK LAPTOP USB-PENDRIVE SLOTS

Disruptive Technology : HOW TO BLOCK LAPTOP USB-PENDRIVE SLOTS: HOW TO BLOCK LAPTOP USB-PENDRIVE SLOTS                                                              OPEN RUN COMMAND.         ...

Friday 11 July 2014

Cable Modem IP Hijacking in Win95/98


         Cable Modem IP Hijacking in Win95/98

   












The purpose of this is to show you how bad cable modems security is and that
even with a win box you can take someone else's IP. You can hijack IP's using
a cable modem and it's very simple in any operating system. Just follow the
steps:
 

1) Choose someone's IP that you wish to have. Make sure the IP is on the same
network. Most cable modem providers use DHCP. The fist thing you have to
do is find the victims IP. Remember the victims IP has to be in the same
network and with the same service provider for this to work.


2) Now this is probably the hardest thing in this file (but it's still easy),
you have to wait until the victims computer is off or you can Smurf kill
his connection. When you think his computer is off-line just try to ping
it to see if you get a response. Do this by going to a DOS prompt and
typing "ping <victims IP>". If you get a response then you have to try
harder.
After you get his PC off-line then you go into your network properties and
edit the IP settings, but instead of having yours there you put the victims
IP, host, and domain.