background preloader

Security

Facebook Twitter

Hack

Networking. Privacy. Sec 1. Sec 2. Verizon DSL Hacked Into My Home Network. Site Index • Wiki • Blog Verizon DSL Router Caught Red-Handed !

Verizon DSL Hacked Into My Home Network

My in-home network was working fine with a Netgear WGR614 ver 7 wireless 4-port Ethernet router using a 192.168.1.1/8 subnet LAN. I signed up for the Verizon DSL service. Verizon's ads show up many on this page in the ad bar on this page. You can compare DSL vs. I installed Verizon's Westell DSL modem on the WAN side of my router following the instruction that came with the modem.

Previous experience with the Helix distribution of Linux, and the Ethereal program (now the Wireshark program) taught me how to probe and log network traffic. When I got home, I perused the logs. SecureIndex. OclHashcat - advanced password recovery. Download latest version GPU Driver requirements: NV users require ForceWare 319.37 or later AMD users require Catalyst 13.12 Features Worlds fastest password cracker Worlds first and only GPGPU based rule engine Free Multi-GPU (up to 128 gpus) Multi-Hash (up to 15 million hashes) Multi-OS (Linux & Windows native binaries) Multi-Platform (OpenCL & CUDA support) Multi-Algo (see below) Low resource utilization, you can still watch movies or play games while cracking Focuses highly iterated modern hashes Focuses dictionary based attacks Supports distributed cracking Supports pause / resume while cracking Supports sessions Supports restore Supports reading words from file Supports reading words from stdin Supports hex-salt Supports hex-charset Built-in benchmarking system Integrated thermal watchdog 80+ Algorithms implemented with performance in mind ... and much more.

Hacking, Security Papers. Tools To Identify Anonymous Users Online. After posting 5 Free Ways to Track Online Leaks of Information, I received numerous requests asking how to identify the online source leaking the confidential company information.

Tools To Identify Anonymous Users Online

Here are some techniques a corporate investigator can use to identify anonymous users online. In most cases the crooked insider is doing one of three methods: Posting to an online message board (i.e. Yahoo Finance Board), creating a URL along the lines of YourCompanySucks.com, or emailing your company, clients and competitors. In all three scenarios it is also likely that he or she is using a fake and anonymous email address that does not identify them outright (i.e. companyhater@email.com, rather than BGregg@email.com). Luckily for us, most insiders are still failing to hide their IP address even within their "anonymous" email.

First, confirm if the email is a randomly created address. A powerful second tool is Spokeo.com. Sub7 features. » The best free security tools for Windows » Becoming paranoid » Tips about computer security, privacy and staying safe online. Many times people ask me what are the essential tools to install in a new computer to improve the security.

» The best free security tools for Windows » Becoming paranoid » Tips about computer security, privacy and staying safe online

Torpark: Download. Latest News Sun May 13 19:41:30 EDT 2007 - Daniel Black, a Gentoo developer, has been very helpful in bringing the autoconf setup up to date.

He also provided a fix for a crash caused by providing an absolute path to —username-file. Other than that, this release isn’t too execiting. I promise the next one will include time travel and a paradox solver. The Hacker's Choice - THC. Checkpoint Firewall FAQs. Default Password List. PHENOELIT. DNS Cache Poisoning Security Research - LURHQ. Theory/security.research - Anonym.OS LiveCD. Punching holes into firewalls. Or "Why firewalls shouldn't be considered a ultimate weapon for network security" or "Secure TCP-into-HTTP tunnelling guide" Introduction Firewalls are heavily used to secure private networks (home or corporate).

Punching holes into firewalls

Usually, they are used to protect the network from: intrusions from outsidersmisuse from insiders In a TCP/IP environment, the typical corporate firewall configuration is to block everything (both incoming and outgoing), and give access to the internet only through a HTTP proxy. Still, this should not considered a ultimate weapon, and network administrators should not rely on the firewalls only. Encapsulation is the basis of networking. As soon as you let a single protocol out, tunelling allows to let anything go through this protocol, and thus through the firewall.

This paper demonstrates how to encapsulate any TCP-based protocol (SMTP, POP3, NNTP, telnet...) into HTTP, thus bypassing the firewall protection/censorship (depending on your point of view) A word of warning: The problem. Project RainbowCrack. Tutorial: Rainbow Tables and RainbowCrack. Rainbow tables reduce the difficulty in brute force cracking a single password by creating a large pre-generated data set of hashes from nearly every possible password.

Tutorial: Rainbow Tables and RainbowCrack

Rainbow Tables and RainbowCrack come from the work and subsequent paper by Philippe Oechslin [1]. The method, known as the Faster Time-Memory Trade-Off Technique, is based on research by Martin Hellman & Ronald Rivest done in the early 1980’s on the performance trade-offs between processing time and the memory needed for cryptanalysis.

In his paper published in 2003, Oechslin refined the techniques and showed that the attack could reduce the time to attack 99.9% of Microsoft’s LAN Manager passwords (alpha characters only) to 13.6 seconds from 101 seconds. Further algorithm refinements also reduced the number of false positives produced by the system. Caution: With tools such as these, we do not condone their use for anything but testing networks for which you have the authority and for implementing defensive measures. The Ethical Hacker Network. Cheat Sheet Roundup - Over 30 Cheatsheets for developers. The Secrets of Wireless Hacking.