background preloader

Shadow

Facebook Twitter

r00tsecurity - your network for security and technology. Evilzone - Hacking & Security Network. Jailbreak basics: Everything you need to know for iPhone and iPad. We see quite a few questions in our Jailbreak Forums about jailbreak basics.

Jailbreak basics: Everything you need to know for iPhone and iPad

So, we've decided to compile a master list of some basic jailbreak magic right here in one place. Hopefully this will help a lot of you beginner jailbreakers learn the ropes (and maybe even help some of you decide whether the leap to the jailbreak world has its advantages for you). We've included common jailbreak lingo, popular jailbreak apps and tools, and videos highlighting some awesome jailbreak utilities!

Common ways to Jailbreak There are usually several ways to Jailbreak depending exactly when a new version of iOS is released, when a new exploit is found, and when new Jailbreaks are released. If you're not sure, here's how to find out which iOS software and iPhone modem firmware you're running. iOS 5.0 & 5.0.1 (GSM/CDMA) Jailbreak (untethered) iClarified - Apple News and Tutorials. Tic tac toe... … three in a row!

Tic tac toe...

Apple released iOS 4.3.3 on Wednesday, and once again the untethered jailbreak exploit that @i0n1c created for 4.3.1 still works. That makes it an unprecedented three firmwares where the same userland exploit works. Comprehensive Package Database. Although packages are easily navigated from any jailbroken iOS device through the Cydia application itself, Cydia Search is a browser-based search engine offering a quick and reliable alternative for finding packages currently available in Cydia.

Comprehensive Package Database

Cydia Search checks all included repositories for new and updated packages once per hour. Additional information on how this system handles package data as well as asnwers to many frequently asked questions can be found on the FAQs page. Cydia is a full-featured graphical front end to APT and the dpkg package management system for the iOS developed by Jay Freeman (saurik). Cydia provides access to the latest software packages (including applications, themes, ringtones, and other modifications) exclusive to the jailbroken iPhone, iPod Touch, or iPad. Cydia is typically installed on iOS devices during the jailbreaking process and includes a handful of default repositories known as community sources. Transferring your iTunes Library. For most users, iTunes does a great job of handling all of the details of managing your media library for you, allowing you to manage your content through iTunes itself and not having to worry too much about the underlying files and folders that make up your iTunes library.

Transferring your iTunes Library

Unfortunately, this user-friendly approach has one serious limitation: When it comes time to move your iTunes library, it can often be a bit of a challenge to figure out exactly what pieces you need to move and how to go about doing this. Many iTunes users start out with a basic iTunes library and use the default settings to store all of their media content on their primary internal hard drive.

However, as you add new content over time, particularly with the additional video content now supported by iTunes, you may soon find that your library threatens to take over your computer. Use your iPhone as a Wireless Router for your PC/Mac. Malicious Linux Commands - From (This article was originally published in Ubuntu Forums but was removed there.

Malicious Linux Commands -

Ubuntuguide feels that knowledge about these risks is more important than any misguided attempts to "protect the public" by hiding their potential dangers or protect the (K)Ubuntu/Linux image. Official homepage. Download The GNU netcat from SourceForge. Default Router Passwords - The internets most comprehensive router password... - StumbleUpon. Top 10 Password Crackers. SecTools.Org: Top 125 Network Security Tools For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools.

Top 10 Password Crackers

In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form . This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the Nmap Security Scanner , Ncat network connector , and Nping packet manipulator ). We're very impressed by the collective smarts of the security community and we highly recommend reading the whole list and investigating any tools you are unfamiliar with. Click any tool name for more details on that particular application, including the chance to read (and write) reviews. Metasploit Penetration Testing Software. Password crackers. SecTools.Org: Top 125 Network Security Tools For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools.

In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form . This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the Nmap Security Scanner , Ncat network connector , and Nping packet manipulator ). We're very impressed by the collective smarts of the security community and we highly recommend reading the whole list and investigating any tools you are unfamiliar with.

Click any tool name for more details on that particular application, including the chance to read (and write) reviews. Zone-H.org - Unrestricted information. Evilzone - Hacking & Security Network. iExploit. Th3 0uTl4wS r3Fug3. r00tsecurity - your network for security and technology.

KaKaRoTo's Blog. Hexxeh's Blog - Home of…um, well, Hexxeh… Binary Revolution Forums. InterN0T - Underground Security Training. Hacking Wireless Networks with Man in the Middle Attacks - Video - StumbleUpon. Kismet. Ettercap. Dsniff. AMAP - fast and reliable application fingerprint mapper. RealVNC - RealVNC remote control software. Short Film of the Day: Stuxnet: Anatomy of a Computer Virus. Why Watch?

Short Film of the Day: Stuxnet: Anatomy of a Computer Virus

Because we should challenge how we define a film. Most of the shorts featured in this column are either easy to spot as stories or completely experimental. Even when a documentary short is in the spotlight, it tells a clear tale of people doing things. This short, is none of those things. Stuxnet: Anatomy of a Computer Virus is an informational film made entirely of voice over narration and motion graphics. It’s beautiful, compelling, and it does tell a story, but it’s nothing like most short films. Hack This Site! DEF CON® 19 Hacking Conference. Google Hacking Database, GHDB, Google Dorks - StumbleUpon. Google hacking. Basics[edit] The following search query will locate all websites that have the words "admbook" and "version" in the title of the website.

Google hacking

It also checks to ensure that the web page being accessed is a PHP file. Google Hacking Database, GHDB, Google Dorks. Google Dorks. Cache: If you include other words in the query, Google will highlight those words within the cached document.

Google Dorks

For instance, [cache:www.google.com web] will show the cached content with the word “web” highlighted. This functionality is also accessible by clicking on the “Cached” link on Google’s main results page. The query [cache:] will show the version of the web page that Google has in its cache. Firesheep - Wikipedia, the free encyclopedia - StumbleUpon. The extension was created as a demonstration of the security risk of session hijacking vulnerabilities to users of web sites that only encrypt the login process and not the cookie(s) created during the login process.[3] It has been warned that the use of the extension to capture login details without permission would violate wiretapping laws and/or computer security laws in some countries.

Firesheep - Wikipedia, the free encyclopedia - StumbleUpon

Despite the security threat surrounding Firesheep, representatives for Mozilla Add-ons have stated that it would not use the browser's internal add-on blacklist to disable use of Firesheep, as the blacklist has only been used to disable spyware or add-ons which inadvertently create security vulnerabilities, as opposed to attack tools (which may legitimately be used to test the security of one's own systems).[4] Note that even if they did, it wouldn't actually prevent anyone from using Firesheep, as Firefox contains a hidden setting to disable this blacklist.[5] Countermeasures[edit] HTTPS[edit]

Firesheep. Dark Reading. Hacking Tip: Hide Your IP Address - StumbleUpon. Krebs on Security. IT Security Magazine - Hakin9. Disinformation: Everything You Know Is Wrong. OpenSSH. Hack Attack: Turn your $60 router into a $600 router. TargetIdAndAnalysis. Hacking Tip: Forge E-mail Addresses - StumbleUpon. Security Tools. Home Page. Airsnarf - A rogue AP setup utility.

Welcome to ntop.org. Wireshark · Go deep. TCPDUMP/LIBPCAP public repository. The Anonymous Press. Your Anon News. Ophcrack.