background preloader

Ethical Hacking

Facebook Twitter

Introducing 35 Pentesting Tools Used for Web Vulnerability Assessment. The Best Hacking Tutorial Sites - Learn Legal Hacking. Written by: Daniel Robson•edited by: Aaron R.

The Best Hacking Tutorial Sites - Learn Legal Hacking

•updated: 2/13/2011 Whether it's to understand potential attack vectors or simply for the fun of it, learning the basics of hacking is something that a lot of people aspire to. Here's our list of the top tutorial based hacking sites. Introduction Films like Swordfish and Hackers have made hacking seem cool, a lifestyle choice almost. However most techies know that in reality it's often a difficult and time consuming process. Server Side Hive. IT Security Cookbook - Firewalls: Securing external Network connections. Summary: A quick guide to firewalls If you just want to connect to the Internet to browse the Web and exchange email for a few users, forget a firewall.

IT Security Cookbook - Firewalls: Securing external Network connections

Just setup a non-networked PC with simple dialup access to a service provider. Install a simple personal firewall like BlackICE. Unplug the modem when the PC is not in use. Solaris/SunOS: Use the instructions in sp/Solaris_hardening.html or sp/Solaris_hardening3.html to strip unnecessary services from the system. Introduction Firewalls are a vast and complex subject, of which a limited overview is presented here. This section concentrates heavily on Internet Firewalls, although a Firewall can (and should) be used between any two networks of different security levels / domains.

What is a Firewall? A packet filter stops or allows packets to flow between two networks according to predefined rules. Why use a Firewall? How does a Firewall protect? PROBLEM: Many Internet applications are not "proxy aware" (e.g. Reference Documentation Policy 1. Beginners Ethical Hacking & Penetration Testing Tutorial - Video Training CD/DVD. Peace of Mind Through Integrity and Insight.


DORKS. Verizon FiOS Wireless Key Calculator! More Update: There are new AP’s that don’t conform to this pattern. If the calculator doesn’t work on yours, maybe it is like these non-conforming-wep keys Update: A cool cool guy named Dylan Taylor wrote a java implementation of this script: if you need an offline version Update: I wrote a bash implementation to make it easy to script, and for offline usage: In my previous post I showed a correlation between the WEP key of a Verizon FiOS install and the MAC address of the access point. This was simply a collection of experimental data that I gathered. Thanks to Fred Williams? Well.. So what is the deal? The first part of the key is a combination of the second and third part of the MAC, which is either 1801 or 1F90.

The second part of the key is this forumula.. hold on to your butts: The 5-character SSID name is a base-36 number of the lower 48 bits (6 hex digits) of the WEP key. To go through an example, the SSID name of “E3X12″ comes out as follows. Thanks again Fred! Connect The Dot Hacking. Have you ever watched a movie that you thought was fall down hilarious when you wore a younger person's clothes, now?

Connect The Dot Hacking

I watched Hollywood Knights last night and man when I first saw that movie I laughed so darn hard I could hardly hear the dialog. I set my wife up for how funny this movie was... but we didn't laugh as much. She hardly did at all. Although it was still funny and much better then, The Notebook, it was kinda dated humor. Sometimes I wonder if we passed the golden era of network hacking or maybe it is the golden era of network discovery. Back in October, Roelof Temmingh presented his new discovery method data mining tool Maltego. Maltego is available in two versions fee based (Maltego) and non fee based (community edition). I was in the United States Navy for almost 10 years. It is the dawning of a new era in network recon and that era is data correlation, but for now it is time for me to push play on "Johnny Dangerously"

US-CERT - United States Computer Emergency Readiness Team. Ethical Hacking. Tools.