background preloader

Ethical Hacking

Facebook Twitter

Introducing 35 Pentesting Tools Used for Web Vulnerability Assessment. The Best Hacking Tutorial Sites - Learn Legal Hacking. Server Side Hive. IT Security Cookbook - Firewalls: Securing external Network connections. Summary: A quick guide to firewalls If you just want to connect to the Internet to browse the Web and exchange email for a few users, forget a firewall.

IT Security Cookbook - Firewalls: Securing external Network connections

Just setup a non-networked PC with simple dialup access to a service provider. Install a simple personal firewall like BlackICE. Unplug the modem when the PC is not in use. Solaris/SunOS: Use the instructions in sp/Solaris_hardening.html or sp/Solaris_hardening3.html to strip unnecessary services from the system. Introduction Firewalls are a vast and complex subject, of which a limited overview is presented here. This section concentrates heavily on Internet Firewalls, although a Firewall can (and should) be used between any two networks of different security levels / domains. What is a Firewall? A packet filter stops or allows packets to flow between two networks according to predefined rules. Why use a Firewall? How does a Firewall protect? PROBLEM: Many Internet applications are not "proxy aware" (e.g. Reference Documentation Policy 1. Beginners Ethical Hacking & Penetration Testing Tutorial - Video Training CD/DVD. Peace of Mind Through Integrity and Insight.

VPN

DORKS. Verizon FiOS Wireless Key Calculator! More Update: There are new AP’s that don’t conform to this pattern. If the calculator doesn’t work on yours, maybe it is like these non-conforming-wep keys Update: A cool cool guy named Dylan Taylor wrote a java implementation of this script: if you need an offline version Update: I wrote a bash implementation to make it easy to script, and for offline usage: In my previous post I showed a correlation between the WEP key of a Verizon FiOS install and the MAC address of the access point.

This was simply a collection of experimental data that I gathered. Thanks to Fred Williams? Well.. So what is the deal? The first part of the key is a combination of the second and third part of the MAC, which is either 1801 or 1F90. The second part of the key is this forumula.. hold on to your butts: The 5-character SSID name is a base-36 number of the lower 48 bits (6 hex digits) of the WEP key. To go through an example, the SSID name of “E3X12″ comes out as follows. Thanks again Fred! Connect The Dot Hacking. Have you ever watched a movie that you thought was fall down hilarious when you wore a younger person's clothes, now?

Connect The Dot Hacking

I watched Hollywood Knights last night and man when I first saw that movie I laughed so darn hard I could hardly hear the dialog. I set my wife up for how funny this movie was... but we didn't laugh as much. She hardly did at all. Although it was still funny and much better then, The Notebook, it was kinda dated humor. Sometimes I wonder if we passed the golden era of network hacking or maybe it is the golden era of network discovery. Back in October, Roelof Temmingh presented his new discovery method data mining tool Maltego.

Maltego is available in two versions fee based (Maltego) and non fee based (community edition). I was in the United States Navy for almost 10 years. It is the dawning of a new era in network recon and that era is data correlation, but for now it is time for me to push play on "Johnny Dangerously" Respectfully, Jimmy Ray Purser. US-CERT - United States Computer Emergency Readiness Team. Ethical Hacking. Tools.