background preloader

Ethical Hacking

Facebook Twitter

Dutch Court Rules Wi-Fi Hacking Legal In Holland. Interesting case and a very interesting interpretation of the laws of Holland which lead to this decision which means the Dutch can hack in Wireless routers legally.

Dutch Court Rules Wi-Fi Hacking Legal In Holland

We published a story about the ethics of jacking open Wi-Fi connections way back in 2006, when a supposed ethics expert said it was ok: Jacking Wifi is ‘OK’ say Ethics Expert. The main differentiation being that a router isn’t a computer and as long as the intruder doesn’t access any of the computers on the internal network – he’s within the law. A Dutch court has ruled that hacking into Wi-Fi connections is not a crime providing any connected computers remain untouched. However Wi-Fi freeloaders would still lay themselves open to civil proceedings.The unusual ruling came in the case of a student who threatened a shooting rampage against staff at students at Maerlant College in The Hague. The threat was posted on 4chan, the notoriously anarchic internet image board, after the student broke into a secure Wi-Fi connection.

Web Based E-mail (Hotmail Yahoo Gmail) Hack/Hacking with JavaScript. “pleez, pleez, PLEEZ teach me how to hack a Hotmail Account!!!”

Web Based E-mail (Hotmail Yahoo Gmail) Hack/Hacking with JavaScript

-unidentified IRC user From here on in you walk alone. Neither little_v OR Black Sun Research Facility AND its members will be responsible for what you do with the information presented here. Do not use this information to impress your “l33t0_b0rit0″ friends. Do not operate in shower. Note: If you see (x), where x is a number, it means that this term is defined at (x) at the bottom of this article.

Intro The purpose of this article is NOT, I repeat, NOT to teach someone how to “hack an email account”. Preface On Wednesday, Sept. 22 1999, yet another bleary day in the life of little v, the following message was sent to my inbox: Ok, don’t puke, I’m going to explain what just happened in a fashion that even your dog can understand. What is this all about? This important part of this posting to the Bugtraq(1) ( mailing list is the actual exploit(2).

What does it do? How does it work? The rest is up to you, my friend. Terms Defined. Ethical Hacking, Penetration Testing & Computer Security. Proxocket - Knowledge Database. From Knowledge Database Overview Proxocket is a dll proxy project for the main Winsock functions which allows to capture any type of packet and data sent/received by a specific software of your choice and optionally modifying its content or the connect, bind and accept functions through a custom dll very easy to create.

Proxocket - Knowledge Database

Proxocket handles the following functions for both ws2_32.dll and wsock32.dll: WSAStartup, socket, WSASocketA, WSASocketW, closesocket, connect, WSAConnect, bind, accept, WSAAccept, recv, recvfrom, WSARecv, WSARecvFrom, WSARecvEx, send, sendto, WSASend, WSASendTo. it has also specific support for TCP, UDP, ICMP, IGMP and RAW packets with handling of SOCK_STREAM, SOCK_DGRAM and SOCK_RAW on both incoming and outgoing data. the project is divided in two parts: Introduction Note that the handling of the WSARecv* and WSASend* functions is still experimental and overlapping is not supported. Capturing the packets Get the WS2_32.DLL and "optionally" WSOCK32.DLL files located in the.