Know who visited your facebook page

dsc00322

Wanna know who visited your facebook last.

Miss orkut days cause of the feature which notified you of who visited last.

Here is a way:

  • Step 01: open your facebook account right click and view source code
  • Step 02: Find for “InitialChatFriendsList”
  • Step 03: You will see coma separated numbers
  • Step 04: Copy one of the number and paste it in the URL eg: http://www.facebook.com/XXXXX

FB

Fun with network cams :D

Google dorks can be used to have fun with network cams and virtually visit place you never thought of :P. well here is the list which can be used:

Image

inurl:”CgiStart?page=”
inurl:/view.shtml
intitle:”Live View / – AXIS
inurl:view/view.shtml
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG) (disconnected)
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:”live view” intitle:axis
intitle:liveapplet
allintitle:”Network Camera NetworkCamera” (disconnected)
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / – AXIS”
intitle:”Live View / – AXIS 206M”
intitle:”Live View / – AXIS 206W”
intitle:”Live View / – AXIS 210?

intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network camera snc-p1?
intitle:”sony network camera snc-m1?
site:.viewnetcam.com -www.viewnetcam.com
intitle:”Toshiba Network Camera” user login
intitle:”netcam live image” (disconnected)
intitle:”i-Catcher Console – Web Monitor”
inurl:indexFrame.shtml Axis
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”

 

Have Funn

Downloads ‹ cyberspidy — WordPress

Below is the link to Download OWASP-2010
OWASP Top 10 – 2010

Below is the link to download OWASP 2013
OWASP Top 10 – 2013 – RC1

Internet Explorer zero-day attacks: CVE-2012-4969

Microsoft has confirmed that a Zero day vulnerability in its internet explorer browser is being actively attacked in the wild.

Proof of concept for IE explorer zero day

The below screen shot shows that the attacker has loaded the exploit in Metasploit and has set all the options like SRVHOST , LOCALHOST, LPORT etc.

Image

 

The following screen shot shows that the attacker hosted a the malicious page in the following URL http://192.168.2.3/is

Image

Note: This URL http://192.168.2.3/is  can be made as a Pishing URL and force victims to visit the same URL with IE browser

 

The following screenshot shows that the victim visits the same URL given by the attacker using IE browser.

Image

 

The following Screen shot shows that the attacker successfully got the shell of the victim and checking the processes running in the victims system.

Image

 

The following Screen shot shows the IP address of the victim which is 192.168.2.6 and the MAC address also

Image

 

The following screenshot shows that the attacker has root access of the victim’s laptop and has migrated to the Google chrome process.

Image 

 

The following screen shot shows that the attacker has captured a screen grab of the victim.

Image