background preloader

Hackin9

Facebook Twitter

Attack Tool Kit / Download. Rogue ap. DIY/Hack. Packet analyzer. A packet analyzer (also known as a network analyzer, protocol analyzer, or sniffer, or for particular types of networks, an Ethernet sniffer or wireless sniffer) is a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network.[1] As data streams flow across the network, the sniffer captures each packet and, if needed, decodes the packet's raw data, showing the values of various fields in the packet, and analyzes its content according to the appropriate RFC or other specifications.

Packet analyzer

Capabilities On wired broadcast LANs, depending on the network structure (hub or switch), one can capture traffic on all or just parts of the network from a single machine within the network; however, there are some methods to avoid traffic narrowing by switches to gain access to traffic from other systems on the network (e.g., ARP spoofing). On wireless LANs, one can capture traffic on a particular channel. Uses. Cs0rfe added: Lock and unlock a Mac using Bluetooth detection.

I discovered a great little app, Proximity, and have now made my Mac's security very seamless.

Cs0rfe added: Lock and unlock a Mac using Bluetooth detection

This approach requires: Bluetooth-enabled Mac and a Bluetooth-capable phone (including the iPhone).Some AppleScript writing or copying-and-pasting.Tested only on 10.5.6 and 10.5.8 install; untested in 10.4 and 10.6. Read on for the background on the solution, as well as the step-by-step implementation. I frequent various sites such as Gizmodo, Lifehacker, TUAW, macosxhints, and many others, and I was pleasantly surprised to discover that I could have an Ubuntu-like security feature with my iPhone. Forensic Packet Analysis. By Tim Dillman, Security Consultant, CISSP, CHP Preface In April 1965, Dr.

Forensic Packet Analysis

Gordon E. Moore published a landmark article in the Electronics Journal entitled “Cramming More Components onto Integrated Circuits.” In summary, Moore’s Law, as it has come to be known, defines an evolutionary exponential rate of technological improvements in electronics. Top 15 Security/Hacking Tools & Utilities. 1.

Top 15 Security/Hacking Tools & Utilities

Nmap I think everyone has heard of this one, recently evolved into the 4.x series. Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Packet Analyzer. What is a Packet Analyzer?

Packet Analyzer

Packet analyzers are used to monitor, intercept, and decode data packets as they are transmitted across networks. Packet analyzers can be computer programs (software) or hardware. Common alternative names for packet analyzers include packet sniffers, protocol analyzers, and network analyzers. Packet Analysis 101 - Wireshark's Packet Details. Labels: packet analysis , Wireshark "The time has come," the Walrus said, "To talk of many things: Of bits-and bytes-and frame headers-- Of trace routes-and pings...

Packet Analysis 101 - Wireshark's Packet Details

You've already seen how to use Wireshark to take a packet capture, how to set capture filters, and how to set display filters. In this post, we're going to talk about Wireshark's Packet Details View. Packet analyzer. Hacking Tip: Password Cracking with Cain & Abel. Hack stuff. Hack. Crack Any Master Combination Lock in 8 Tries or Less Using This Calculator. Master Lock combination padlocks have been known to be vulnerable to an attack that reduces their 64,000 possible combinations down to 100.

Crack Any Master Combination Lock in 8 Tries or Less Using This Calculator

I've devised a new attack for cracking any Master combo lock that simplifies the process and reduces the amount of work down to only 8 combinations. Don't Miss: Behind the Hack: How I Discovered the 8-Try Exploit. What You Should Know About SHODAN and SCADA « Digital Bond's SCADA Security Portal. In case you missed it, ICS-CERT issued an advisory about using SHODAN for identifying SCADA components connected to the Internet.

What You Should Know About SHODAN and SCADA « Digital Bond's SCADA Security Portal

The advisory covers the issues and the IT news outlets are picking up the story as well. Rather than echo that information or complain about the awful combination of poor security hardening practices and Internet connectivity, I thought we’d cover two things in this post: 1.) Wireshark · Go Deep. Rainbow.tmptech.net - md5 sha1 sha256 hash hashes of Td97. Attacks (Hacking)