background preloader

Hack

Facebook Twitter

Format String par l’exemple. Behemoth level4 [Intruded.net] behemoth.intruded.net : 10103 user : level4 pass : Shai#N9b.

Format String par l’exemple

Communauté Alternative Underground. HackBBS. « intitle:index of » famille. Compass Module. This is a fully integrated compass module that combines the Honeywell HMC6352 2-axis magneto-resistive sensors with the required analog and digital support circuits, microprocessor and algorithms for heading computation.

Compass Module

It comes assembled with a 4-pin male header soldered on. The Compass Sensor is fully integrated with the Antipasto Arduino IDE and can provide compass headings in degrees over Arduino serial. Applications Homebrew virtual reality & gaming systems Robotics and dead reckoning navigation systems Compassing & outdoor sports GPS confirmation Antenna positioning. Social Engineering - Security Through Education. How To Hack Into Someones Webcam Updated Instructions Working! (Hd) Description: In this video i'll show how to "hack" into someones webcam using the Social engineering Toolkit + Java Exploit ;) what gains the attacker a meterpreter shell with this shell it is possbile to take a snapshot Song - Face the Wolf - Well hello there, mothership Zeta Tags: meterpreter , metasploit , webcam ,

How To Hack Into Someones Webcam Updated Instructions Working! (Hd)

Programmable HID USB Keystroke Dongle: Using the Teensy as a pen testing device. Motion Activated Camera - Day of the New Dan. December 20, 2009 I made a relatively simple attachment to my Canon SLR to create a motion activated camera using Arduino.

Motion Activated Camera - Day of the New Dan

A lot of this was based on and inspired by the intervalometer project at The Honey Jar. I made some changes to his circuit to use a 4N35 optocoupler instead of reed relays. Here is what you will need: Canon SLR camera that takes a 2.5mm headphone plug for remote shutter/focus control. The motion detector is really sensitive so I cut a small hole in the box to try and and reduce its field of view.

First solder some wires to the 2.5mm headphone plug. Sensors. Comment bien utiliser MetaSploit ? Comment bien utiliser MetaSploit ?

Comment bien utiliser MetaSploit ?

Je vous parle de temps en temps de MetaSploit, cet outil qui permet de réaliser des audits en sécurité et de tester / développer ses propres exploits. Au premier abord, MetaSploit n'est pas évident à prendre en main, et les tutos disponibles à ce sujets sont un peu confus et éparpillés un peu partout. Bref, tout ça c'était avant que je tombe sur le site d'Offensive Security qui propose tout un doc sur la façon de se servir de Metasploit et de créer ses propres modules. Apprenez à utiliser Metasploit avec des tutos et des vidéos. Metasploit est une bonne plateforme pour quiconque souhaite tester des failles de sécurité ou réaliser des "exploits" mais il n'est pas simple de l'utiliser et beaucoup se retrouvent vite perdu lorsqu'ils essayent de pousser un peu plus la chose.

Apprenez à utiliser Metasploit avec des tutos et des vidéos

Pour vous aider dans votre apprentissage, je vous ai trouvé quelques liens sympa avec des tutoriels et des vidéos expliquant les principes de bases de Metasploit. Tout d'abord, un bon tuto vidéo de chez IronGeek vous montrera (même si vous ne parlez pas anglais), ce qu'il faut faire étape par étape pour utiliser. BIOS Password Backdoors in Laptops. Synopsis: The mechanics of BIOS password locks present in current generation laptops are briefly outlined.

BIOS Password Backdoors in Laptops

Trivial mechanisms have been put in place by most vendors to bypass such passwords, rendering the protection void. A set of master password generators and hands-on instructions are given to disable BIOS passwords. When a laptop is locked with password, a checksum of that password is stored to a so-called FlashROM - this is a chip on the mainboard of the device which also contains the BIOS code and other settings, e.g. memory timings. For most brands, this checksum is displayed after entering an invalid password for the third time: The dramatic 'System Disabled' message is just scare tactics: when you remove all power from the laptop and reboot it, it will work just as before.

Krom - Cours de Cracking / Hacking - Cours N° 1. Hack a Day. Web-controlled Twittering Roomba. Back¦Track-fr sécurité réseau & intrusion. Insecure.Org - Nmap Free Security Scanner, Tools & Hacking resources. Gadget Teardowns. Massachusetts, The people of Massachusetts have always stood up for their right to repair.

Gadget Teardowns

In 2012, voters passed a law that ensured residents' right to repair their car wherever they wanted. Now, it's time to do the same for electronics. With the Digital Right to Repair Bill, H.3383, we have a chance to guarantee our right to repair electronics — like smartphones, computers, and even farm equipment. We have a chance to help the environment and stand up for local repair jobs—the corner mom-and-pop repair shops that keep getting squeezed out by manufacturers. The Digital Right to Repair Bill requires manufacturers to provide owners and independent repair businesses with fair access to service information, security updates, and replacement parts. If you agree with us, find out who represents you in the Massachusetts legislature. SEMAGEEK : Actualités High Tech, Robot, Électronique, DIY et Arduino. Exploit/Vulnerability Search Engine.

Arduino. Because life is a hack ! La Grotte Du Barbu. Le blog de Tix. le Geek. Hak5 – Technolust since 2005 Hak5 - Technolust since 2005 » Trust Your Technolust. Metasploit Unleashed. HOW TO: Metasploit Meterpreter as a Backdoor. Pastenum – Pastebin/pastie enumeration tool. Introduction When conducting a pen-test, the process typically starts with the reconnaissance phase, the process of gathering information about your target(s) system, organization or person.

Pastenum – Pastebin/pastie enumeration tool

Today, we want to present a tool that can be added to your reconnaissance toolkit. Text dump sites such as pastebin and pastie.org allow users to dump large amounts of text for sharing and storage. As these sites become more popular the amount of sensitive information being posted will inevitably increase. Pastenum is designed to help you find that information and bring it into one easy to read location. The hope is it will allow internal security teams to run simple queries about their companies and determine if they have sensitive information residing in one of these text dumps. In order to do so, it uses a series of search queries for keywords, provided by the pentester. Installing the tool To use Pastenum you will need ruby 1.9.2. Example : Now become that user account, using the profile of the user : - Metasploit Mac OS X Post Exploitation Enumeration and Hash Dump SecuObs.

Afficher le sujet - Metasploit Fast track. Initiation à I2P. i2p. I2P (Invisible Internet Project) est un réseau anonyme, offrant une simple couche logicielle que les applications peuvent employer pour envoyer de façon anonyme et sécurisée des messages entre elles.

i2p

Free Public Proxy Servers Lists: HTTP, HTTPS/Secure/Tunnel/Connect/IRC, SOCKS, CGI/PHP/Web, transparent/anonymous/elite/high anonymous, standard, non-standard ports.