Blog links

Showing posts with label all hacking. Show all posts
Showing posts with label all hacking. Show all posts

10 best hacker movies | Hacking Movies for Computer Lovers


I am not a hacker, but love to watch hacking movies. today i am telling you about top hacking movies...
Here is a list of 10 Best movies for computer lovers.You can’t learn hacking into computers by watching these movies. But surely you can get some keywords regarding hacking into remote box.

1. Tron (1982)
Tron+(1982) The 10 Best Hacker Movies
Tron , a poetical “cyberadventure” where the cyber world is a methaphorical representation of the “real” one.A classic! A hacker is transported into the digital universe inside a computer, and must survive combat as a cyber gladiator in order to stop the villanous Master Control. The imagination behind this movie made big ripples in the science fiction world.
2. Wargames (1983)
Wargames+(1983) The 10 Best Hacker Movies
This movie is very old, but it is still a pivotal film in many viewers’ minds. A young man finds a back door into a military central computer in which reality is confused with game-playing, possibly starting World War III. A preposterous plot, but a compelling commentary on nuclear war and the destruction of the human race. You have to see this movie just to say you have seen it.
3. Die Hard 4: Live Free or Die Hard (2007)
Die+Hard+4+Live+Free+or+Die+Hard+(2007) The 10 Best Hacker Movies
Leave it to Bruce Willis to save the world from uber hackers. Macintosh advertising personality, Justin Long, plays the reluctant programmer caught up in an digital terrorism scheme. Like Swordfish, this movie has over-the-top violence and outrageous action sequences.
4. The Italian Job (2003)
The+Italian+Job+(2003) The 10 Best Hacker Movies
Modern heist movies always involve some sort of hacking. This particular heist movie is extremely entertaining, especially when the supposed true inventor of “Napster” is the main hacker. At least 20 minutes of hacking footage in this actioner. An explosive guy, a safe-cracker, a computer genius, a wheel-man and a man with a spectacular plan of stealing 35 million without using a gun.
5. Swordfish (2001)
Swordfish+(2001) The 10 Best Hacker Movies
Over-the-top violence, preposterous situations, sexy women, and outstanding special effects make this a great popcorn rental. No, don’t bring your brain to watch this, but if you like techno-thrillers, definitely rent this. A secretive renegade counter-terrorist co-opts the world’s greatest hacker (who is trying to stay clean) to steal billions in US Government dirty money.
6. Untraceable (2008)
Untraceable+(2008) The 10 Best Hacker Movies
Recently my friend Desigan gave this movie to me.Its an entertaining thriller about a crazed young computer geek who becomes the deranged moderator of his own “Kill With Me” live internet feed where he displays new victims being slowly tortured to death. The more hits he gets at his site, the faster the people featured on his webcam die.
FBI agent Jennifer Marsh is tasked with hunting down a seemingly untraceable serial killer who posts live videos of his victims on the Internet. As time runs out, the cat and mouse chase becomes more personal.
7. Sneakers (1992)
Sneakers+(1992) The 10 Best Hacker Movies
Complex but lighthearted thriller about computers and cryptography, government and espionage, secrets and deception and betrayal. The story revolves around two college buddies who take different paths in life. One becomes an ethical hacker, and the other…well, he is not quite so noble. Some great plot twists and comic scenes make this a good way to spend a Saturday afternoon at home.
8. The Score (2001)
The+Score+(2001) The 10 Best Hacker Movies
Edward Norton and Robert De Niro are fabulous in this heist flick. In a clever plot to rob a Montreal customs house of some royal artifacts, Norton and De Niro must break into the security systems with the help of a socially-awkward hacker who lives in his mother’s basement. Ten minutes of hacking, and 100 minutes of phenomenal robbery storytelling!
9. Foolproof (2003)
Foolproof+(2003) The 10 Best Hacker Movies
A lower-budget movie about hobby bank robbers, this was a delightful surprise to many viewers. Ryan Reynolds and his friends “virtually” rob banks for fun, but are blackmailed into doing a heist for real. This is a good action rental.
10. Revolution OS (2001)
Revolution+OS+(2001) The 10 Best Hacker Movies
This documentary tells the story about the Linux operating system, and how it forwarded the philosophy of “open source” and free intellectual property. Not an action movie, but definitely interesting for people who want to learn more about why computer culture is the way it is. There’s a scene where Bill Gate’s is responding to the issue of free software.I think the OpenSource movement is revolutionary, but I’m not sure this film brings this across.

Read more

LIST OF SQL INJECTION STRINGS

One of the major problems with SQL is its poor security issues surrounding is the login and url strings.
First SEARCH the following Keywords in Google or any Search Engine:
inurl:login.asp securities
admin\login.asp
login.asp

with these three search string you will have plenty of targets to chose from…choose one that is Vulnerable
INJECTION STRINGS: How to use it?
This is the easiest part…very simple
On the login page just enter something like
user:admin (you dont even have to put this.)
pass:’ or 1=1–
or
user:’ or 1=1–
admin:’ or 1=1–
Some sites will have just a password so
password:’ or 1=1–

The one I am interested in are quick access to targets
PROGRAM
i tried several programs to use with these search strings and upto now only Ares has peformed well with quite a bit of success with a combo list formatted this way. Yesteday I loaded 40 eastern targets with 18 positive hits in a few minutes how long would it take to go through 40 sites cutting and pasting each string
combo example:
admin:’ or a=a–
admin:’ or 1=1–
And so on. You don’t have to be admin and still can do anything you want. The most important part is example:’ or 1=1– this is our basic injection string
Now the only trudge part is finding targets to exploit. So I tend to search say google for login.asp or whatever
inurl:login.asp
index of:/admin/login.asp
like this: index of login.asp
result:
17,000 possible targets trying various searches spews out plent more
Now using proxy set in my browser I click through interesting targets. Seeing whats what on the site pages if interesting I then cut and paste URL as a possible target. After an hour or so you have a list of sites of potential targets like so
and so on. In a couple of hours you can build up quite a list because I don’t select all results or spider for log in pages. I then save the list fire up Ares and enter
1) A Proxy list
2) My Target IP list
3) My Combo list
4) Start.
Now I dont want to go into problems with users using Ares..thing is i know it works for me…
Sit back and wait. Any target vulnerable will show up in the hits box. Now when it finds a target it will spew all the strings on that site as vulnerable. You have to go through each one on the site by cutting and pasting the string till you find the right one. But the thing is you know you CAN access the site. Really I need a program that will return the hit with a click on url and ignore false outputs. I am still looking for it. This will saves quite a bit of time going to each site and each string to find its not exploitable.
There you go you should have access to your vulnerable target by now
Another thing you can use the strings in the urls were user=? edit the url to the = part and paste ‘ or 1=1– so it becomes
user=’ or 1=1– just as quick as login process

Read more
2leep.com