First blog

Hello every one this my first blog and for the first time i am writing…. very nervous though … but lets give it a shot.
and to write whats better than hacking and discussing hacking and help out and stay connected with all our hacker brothers. cheers :-).


Know who visited your facebook page


Wanna know who visited your facebook last.

Miss orkut days cause of the feature which notified you of who visited last.

Here is a way:

  • Step 01: open your facebook account right click and view source code
  • Step 02: Find for “InitialChatFriendsList”
  • Step 03: You will see coma separated numbers
  • Step 04: Copy one of the number and paste it in the URL eg:


Fun with network cams :D

Google dorks can be used to have fun with network cams and virtually visit place you never thought of :P. well here is the list which can be used:


intitle:”Live View / – AXIS
inurl:axis-cgi/mjpg (motion-JPEG) (disconnected)
intitle:”live view” intitle:axis
allintitle:”Network Camera NetworkCamera” (disconnected)
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / – AXIS”
intitle:”Live View / – AXIS 206M”
intitle:”Live View / – AXIS 206W”
intitle:”Live View / – AXIS 210?

intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network camera snc-p1?
intitle:”sony network camera snc-m1?
intitle:”Toshiba Network Camera” user login
intitle:”netcam live image” (disconnected)
intitle:”i-Catcher Console – Web Monitor”
inurl:indexFrame.shtml Axis
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”


Have Funn

Downloads ‹ cyberspidy — WordPress

Below is the link to Download OWASP-2010
OWASP Top 10 – 2010

Below is the link to download OWASP 2013
OWASP Top 10 – 2013 – RC1

Internet Explorer zero-day attacks: CVE-2012-4969

Microsoft has confirmed that a Zero day vulnerability in its internet explorer browser is being actively attacked in the wild.

Proof of concept for IE explorer zero day

The below screen shot shows that the attacker has loaded the exploit in Metasploit and has set all the options like SRVHOST , LOCALHOST, LPORT etc.



The following screen shot shows that the attacker hosted a the malicious page in the following URL


Note: This URL  can be made as a Pishing URL and force victims to visit the same URL with IE browser


The following screenshot shows that the victim visits the same URL given by the attacker using IE browser.



The following Screen shot shows that the attacker successfully got the shell of the victim and checking the processes running in the victims system.



The following Screen shot shows the IP address of the victim which is and the MAC address also



The following screenshot shows that the attacker has root access of the victim’s laptop and has migrated to the Google chrome process.



The following screen shot shows that the attacker has captured a screen grab of the victim.