tag:blogger.com,1999:blog-3121270199089759062.post5940432868288084965..comments2023-10-21T01:13:03.832-07:00Comments on RHA Blog: Which Programming Language To Learn For Hacking?Rafayhttp://www.blogger.com/profile/15944091083959815608noreply@blogger.comBlogger18125tag:blogger.com,1999:blog-3121270199089759062.post-73653581601833526112015-07-16T21:01:40.965-07:002015-07-16T21:01:40.965-07:00Which languge should i learn for hacking facebook
...Which languge should i learn for hacking facebook<br />Anonymoushttps://www.blogger.com/profile/03471169730860699854noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-22184138733892809842013-11-22T17:46:08.467-08:002013-11-22T17:46:08.467-08:00hello
thnx for your article
i want to know pleas...hello <br />thnx for your article <br />i want to know please if c# can use instead of c\c++ ?<br />Anonymoushttps://www.blogger.com/profile/13208965499811922940noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-35156688714634163202013-11-22T17:42:12.974-08:002013-11-22T17:42:12.974-08:00hello
thnx for your article
i want to know pleas...hello <br />thnx for your article <br />i want to know please if c# can use instead of c\c++ ?<br />Anonymoushttps://www.blogger.com/profile/13208965499811922940noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-83233694817410047912013-01-09T07:00:13.346-08:002013-01-09T07:00:13.346-08:00My question iz nt related 2 diz
My friend know an...My question iz nt related 2 diz <br />My friend know answer fr my security question <br />and he reset my passwrd,anywayz i can get my acc back but the process repeats again he ll again do the same thng..<br /> when i checked in fb security itz mentioned that u cant change security question ...watz da soln fr my prblm<br />thnkz in advance Srikanth-https://www.blogger.com/profile/15638430528090887993noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-75895627076411523152012-06-10T20:56:32.198-07:002012-06-10T20:56:32.198-07:00You better learn for yourself and stop expecting e...You better learn for yourself and stop expecting everyone else to do stuff for you<br /><br />#USEGOOGLE<br /><br />A MANS BEST FRIEND<br /><br />:-)))Abimaelnoreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-31584410666908805412012-02-24T02:04:35.525-08:002012-02-24T02:04:35.525-08:00hey rafay ,
i work in asp.net with sql , how can i...hey rafay ,<br />i work in asp.net with sql , how can i write exploit?Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-54717554253142436962012-01-21T04:15:16.532-08:002012-01-21T04:15:16.532-08:00@Rafay Baloch can you please please please help me...@Rafay Baloch can you please please please help me hack this particular person's fb for meAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-33414818405196763172012-01-19T09:24:17.316-08:002012-01-19T09:24:17.316-08:00Thanks BossThanks BossSolomon Ubanihttps://www.blogger.com/profile/12621987873859914497noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-48183547572935518112012-01-19T01:40:06.533-08:002012-01-19T01:40:06.533-08:00It's comes within backtrack, However as it'...It's comes within backtrack, However as it's python you can run it on windows. But backtrack is recommended.Rafayhttps://www.blogger.com/profile/15944091083959815608noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-46253037126676346472012-01-18T23:20:02.608-08:002012-01-18T23:20:02.608-08:00Ok Thanks...can S.E.T. run on windows??...I Dont h...Ok Thanks...can S.E.T. run on windows??...I Dont have backtrack..if yes can u kindly paste the download link...Solomon Ubanihttps://www.blogger.com/profile/12621987873859914497noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-56166471193335978442012-01-18T12:50:48.959-08:002012-01-18T12:50:48.959-08:00Take a look at Javaapplet exploit in social engine...Take a look at Javaapplet exploit in social engineering toolkit, it's a very good example. Also take a look at java drive by exploits.Rafayhttps://www.blogger.com/profile/15944091083959815608noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-26223198445617880842012-01-18T12:29:37.152-08:002012-01-18T12:29:37.152-08:00Yeah rafay i know buffer & stack overflow... m...Yeah rafay i know buffer & stack overflow... my problem is i've not seen a Java Exploit...can u give me an example of a java exploit... so that i can see what it looks likeSolomon Ubanihttps://www.blogger.com/profile/12621987873859914497noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-86128024961087531822012-01-18T11:17:08.669-08:002012-01-18T11:17:08.669-08:00@Niketan
Welcome dude, Traffic decreased due to pa...@Niketan<br />Welcome dude, Traffic decreased due to panda effect.Rafayhttps://www.blogger.com/profile/15944091083959815608noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-51142894477478714542012-01-18T11:16:34.627-08:002012-01-18T11:16:34.627-08:00@RoyalPride
Are you familiar with basic exploit de...@RoyalPride<br />Are you familiar with basic exploit development?, Buffer overflows and stack overflows, If yes then you could start by looking at the source of exciting java exploits and then integrating your own idea and think of possible ways to make it more function-able.Rafayhttps://www.blogger.com/profile/15944091083959815608noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-91269269026269845172012-01-18T10:57:36.262-08:002012-01-18T10:57:36.262-08:00@rafay thanks for the reply i really appreciate......@rafay thanks for the reply i really appreciate...i'm a Java Developer...can u please tell me where/how i can learn to develope exploits using Java??Solomon Ubanihttps://www.blogger.com/profile/12621987873859914497noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-44341202504125064352012-01-18T10:35:59.784-08:002012-01-18T10:35:59.784-08:00Nice article dude..because so many peoples ask thi...Nice article dude..because so many peoples ask this question now days.Hope it ll help all those peoples.<br /><br />@Rafay : Why your website traffic decreased ?<br /><br />My recent post : <a href="http://www.wildhacker.com/2011/11/cellphone-hacking-how-to-spy-on-cell.html" rel="nofollow">Mobile hacking</a>wildrankhttps://www.blogger.com/profile/09195054672067515173noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-90662268157592423642012-01-18T10:19:20.605-08:002012-01-18T10:19:20.605-08:00Yes, Java can be used for creating exploits, Almos...Yes, Java can be used for creating exploits, Almost all Russian exloit kits use java. However it's not very common and people prefer languages like c,c++,perl etc. As far as reverse engineering is concerned assembly is must for proper understanding.Rafayhttps://www.blogger.com/profile/15944091083959815608noreply@blogger.comtag:blogger.com,1999:blog-3121270199089759062.post-29297226809346933372012-01-18T08:51:27.759-08:002012-01-18T08:51:27.759-08:00...Thanks for the article...but can i use java to ......Thanks for the article...but can i use java to write exploits/or perform reverse engineering???...Solomon Ubanihttps://www.blogger.com/profile/12621987873859914497noreply@blogger.com