background preloader

Hack

Facebook Twitter

Hackaday sur Twitter : "DOLPi is a #RaspberryPi polarimetric camera for detecting invisible things. On #HackadayIO. DOLPi - RasPi Polarization Camera. The project's blog is at: A complete project description including detailed construction instructions and Python code is available in pdf format at: Or from HERE (Dropbox download) Mirror backup site for the project description at: All files available from Dropbox.

DOLPi - RasPi Polarization Camera

CLICK HERE to be taken to DOLPi folder. Images and text (c) 2015 David Prutchi unless otherwise stated. NOTE: The space available for the project description in Hack-A-Day.IO is limited, so the following "detailed description" is just a brief summary of the most significant aspects of the DOLPi Project. Summary This project presents the development and construction of two low-cost polarimetric camera types based on the Raspberry Pi 2. A complete project description including detailed construction instructions and Python code is available in pdf format at: The DOLPi Project Try this experiment - next time that you go outdoors on a sunny day, tilt your head while wearing polarized sunglasses.

Hacker community. PenTest & Hacking Tools: [AttackVector Linux] Linux distro for anonymized penetration based on Kali and TAILS. Tactics to Hack an Enterprise Network « Strategic Cyber LLC. In June 2012, I released Cobalt Strike, a commercial penetration testing package that picks up where Armitage leaves off.

Tactics to Hack an Enterprise Network « Strategic Cyber LLC

Cobalt Strike is a direct expression of what I think a penetration test looks like. If you’re interested in this vision, this post will walk you through it. The term penetration test is overloaded and may mean something different with each person that you ask to define it. To some people, a penetration test is a vulnerability verification exercise. To others, it’s an expert using the tactics and techniques of a skilled adversary to assess a mature security program’s ability to cope with a targeted attack.

I used to work as a contractor, providing red team services to a DoD customer. Reconnaissance We’ll start where the active part of a penetration test begins, reconnaissance. Once you have a system profile, you can plan an attack. Access Cobalt Strike recommends client-side exploits based on a system profile. Java Drive-by Exploits Hacking with Features Spear Phishing. College researchers hack government drone with $1,000 GPS spoofer. PHD — Positive Hack Days. Участники конкурса HackQuest.

iPhone

Learn Web hacking using DVWA. Do you like this story?

Learn Web hacking using DVWA

With lots of curious readers asking me how to practice hacking and from where to start,Damn Vulnerable Web App (DVWA) is great application to plunge yourself in.DVWA is a PHP/MySQL web application that is damn vulnerable..literally. Its main goals are to be light weight, easy to use and full of vulnerabilities to exploit and it successfully achieves those :P . And frankly it can be used to learn or teach the art of web application security. The DVWA is bundled with the following type of vulnerabilities- SQL Injection XSS (Cross Site Scripting) LFI (Local File Inclusion) RFI (Remote File Inclusion) Command Execution Upload Script Login Brute Force WARNING !!

Keep learning.. Hack Linux and Windows 7 Passwords using KON BOOT. Do you like this story?

Hack Linux and Windows 7 Passwords using KON BOOT

Tired of trying breaking into that Linux box which pesks you with its password screen ? Well,your day is saved when Kon Boot comes to rescue . Apart from the stupid logo,Kon-Boot is an fantastic prototype software which can change contents of a Linux kernel and Windows kernel while booting.It will you to log into a Linux system as “root” user without even typing the correct password or to elevate privileges from current user to root. For Windows systems it allows to enter any password protected profile without any knowledge of the password.Entire Kon-Boot was written in pure x86 assembly in TASM 4.0. Kon boot was mainly created for Ubuntu,but now it supports more Linux distributions. Here is how you can Hack Linux Passwords using Kon-Boot- Here is a Sample Console output of what it will look like - Ubuntu 8.04 torpeda tty1 torpeda login: kon-usr # id uid=0(root) gid=0(root) # whoami root.