background preloader

Hacking

Facebook Twitter

HYDRA - fast and flexible network login hacker. [0x00] News and Changelog Check out the feature sets and services coverage page - including a speed comparison against ncrack and medusa (yes, we win :-) ) Development just moved to a public github repository: There is a new section below for online tutorials.

HYDRA - fast and flexible network login hacker

Read below for Linux compilation notes. CHANGELOG for 8.3 =================== ! Development moved to a public github repository: * Support for upcoming OpenSSL 1.1 added. needs testing. * Fixed hydra redo bug (issue #113) * Updated xhydra for new hydra features and options * Some more command line error checking * Ensured unneeded sockets are closed You can also take a look at the full CHANGES file [0x01] Introduction Welcome to the mini website of the THC Hydra project.

Number one of the biggest security holes are passwords, as every password security study shows. Aircrack-ng. Description Aircrack-ng is an 802.11 WEP and WPA/WPA2-PSK key cracking program.

aircrack-ng

Aircrack-ng can recover the WEP key once enough encrypted packets have been captured with airodump-ng. This part of the aircrack-ng suite determines the WEP key using two fundamental methods. The first method is via the PTW approach (Pyshkin, Tews, Weinmann). The default cracking method is PTW. Additionally, the program offers a dictionary method for determining the WEP key. Top 10 Ways to Access Blocked Stuff on The Web. Access any album on any Facebook profile. Hi everyone, I was creating a presentation last week covering the security risks and weaknesses of social networking websites and I found a few interesting things.

Access any album on any Facebook profile

The most interesting flaw I found was the poor control around access to users photo albums on Facebook, not the worlds biggest hack by a long way but still interesting. Hacker Test: A site to test and learn about web hacking. Guide To (Mostly) Harmless Hacking. Whitepixel breaks 28.6 billion password/sec - Zorinaq. I am glad to announce, firstly, the release of whitepixel, an open source GPU-accelerated password hash auditing software for AMD/ATI graphics cards that qualifies as the world's fastest single-hash MD5 brute forcer; and secondly, that a Linux computer built with four dual-GPU AMD Radeon HD 5970 graphics cards for the purpose of running whitepixel is the first demonstration of eight AMD GPUs concurrently running this type of cryptographic workload on a single system.

Whitepixel breaks 28.6 billion password/sec - Zorinaq

This software and hardware combination achieves a rate of 28.6 billion MD5 password hashes tested per second, consumes 1230 Watt at full load, and costs 2700 USD as of December 2010. Index of /content/downloads/pdf. Free WiFi in Airports and Public Hotspots. By Brian Wilson, CCNA, CCSE, CCAI, MCP, Network+, Security+, JNCIA Recently while traveling I noticed a hot spot and wanted to surf the internet.

Free WiFi in Airports and Public Hotspots

Untitled. Hacker Attack Tools. 250+ working proxies for safe web access from work or school. Ask the eConsultant : Technical Tips Proxy List : 250+ working proxies for safe access from work/school Just click on any proxy and enter URL on the resulting page.

250+ working proxies for safe web access from work or school

Report a new proxy / a non-working proxy : eConsultant » Blog Archive » Proxy List : 250+ working proxies for safe access Most Popular Pages : SecureIndex. How To Hack – Beginners Guide to Hacking Computers. How to Upload MP3 Music Files to Flickr or Picasa Web Albums. Learn how to embed MP3 music, songs and other audio files in an image and upload them to Flickr just like you upload other videos or photographs.

How to Upload MP3 Music Files to Flickr or Picasa Web Albums

While most people use Flickr for uploading photos and videos, one can also use photo sharing websites like Picasa or Flickr for hosting MP3 songs and other audio files. For instance, these Flickr pictures are identical but the one on right is actually an MP3 file. To hide an MP3 file into a JPEG image, copy the MP3 file and a picture into a folder. Open the command prompt window (Start – > Run – > cmd) and switch to this folder. Now run the following command: The Black Book of Hacking. Hacks - how to articles from wikiHow. What the Hack ?! - the temptation of the Dark Side. 'For educational purposes' ... that must be about the most widespread excuse for publishing virus creation tools,descriptions of exploits, 'hacking' manuals and the likes.

What the Hack ?! - the temptation of the Dark Side

Id rather delete their system32.. The Hacker Crackdown. Russian Password Crackers: fastest, tested password recovery software. Most Popular Hacking Tools. Underground Search - Exploits. Painfully Computer Pranks ~ Computer Hacking. 5 Fun things To Do on School Computers - Dave Pagurek.

November 26th, 2010 I know it's been a while, but I'm reinstating my weekly blog post policy.

5 Fun things To Do on School Computers - Dave Pagurek

This week will be about something I've wanted to write about for a while: School computers! They're just too easy to hack and do fun stuff with, especially because teachers are just so incompetent with technology sometimes. Anyway, tome for the top five! Hack This Site! Challenges - ThisisLegal.com. Index of /content/downloads/pdf. Default Password List. How to hack a computer with IP address. There are plenty of papers out there that go into how to obtain an IP Address from the preferred mark of your choice. So I’m not going to go into that subject. Alright so say we got the targets IP Address finally.

What do we do with this IP Address. Well first ping the IP Address to make sure that its alive. In other words online. 1) Blues Port Scanner – This program will scan the IP address that you chose and identify open ports that are on the target box. The Hack FAQ: Table of Contents. Infinity Exists. How To Find Product Key Of Any Software » Product Key Finder Tips. How to find the product key of any software that you want..??

How To Find Product Key Of Any Software » Product Key Finder Tips

A product key is a unique identification number or code, used in software like operating systems and games, to prevent counterfeiting and piracy. This is a specific software program. For the most part, a product key operating system is an insignificant number, but when you need to re-install your OS, suddenly the product key becomes the code harder to find. Find Product Key Of Windows 7 A product key Windows 7 is needed to activate the system, format the Windows 7, or in the event of a system crash, re-installing Windows 7 on your computer. How to find the product key of Windows 7. Hacking with command prompt. Crack/Keygen Sites That Are Safe To Use. Top 15 Open Source/Free Security/Hacking Tools. 1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.

Nmap homepage. 2. Wireshark is a network protocol analyzer. 3. Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners. 4. Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. Cracking_wpa. Version: 1.20 March 07, 2010 By: darkAudax Introduction This tutorial walks you through cracking WPA/WPA2 networks which use pre-shared keys. I recommend you do some background reading to better understand what WPA/WPA2 is. The Wiki links page has a WPA/WPA2 section. Distributed Denial of Service (DDoS) Attacks/tools.

Hack Software and Run the Trial Program Forever. In this post, I will show you how to hack a Software and run the trial program forever. Most of us are familiar with many software programs that run only for a specified period of time in the trial mode. Once the trial period is expired, these programs stop functioning and demand for a purchase. However, there is a way to run the software programs so that they function beyond the trial period. The Hacker's Code. Level 1. Tutorial: Hacking Linux with Armitage. By Raphael Mudge, Armitage Creator Metasploit is a popular exploitation framework that has seen plenty of coverage on ethicalhacker.net. This article introduces Armitage, a new GUI for Metasploit built around the hacking process. Hackety Hack!