background preloader

Hacking Articles

Facebook Twitter

5 Fun things To Do on School Computers. November 26th, 2010.

5 Fun things To Do on School Computers

Exploiting Unexploitable XSS. XSS that are protected by CSRF protection or where other mitigating factors are present are usually considered to be unexploitable or of limited exploitability.

Exploiting Unexploitable XSS

This post details real world examples of exploiting “unexploitable” XSS in Google and Twitter. While the XSS detailed in this post are site specific the methods that were used to exploit them could be applied to other websites with similar implementations. Alex’s (kuza55) Exploiting CSRF Protected XSS served as inspiration for this post. Google. U.S. Outgunned in Hacker War. The Freenet Project - /index. U.S. government hankers for hackers.

Is Bitcoin the most dangerous open source project ever? Bitcoin "can be really dangerous to social news ecosystem" So you agree with the article, but you don't want people to talk too much about it on HN?

Is Bitcoin the most dangerous open source project ever?

I think it is a very weird position to hold. Imagine there was a very dangerous disease, should it be discussed openly in physician congresses? Yes? Same here (HN is the hackers congress, right?) 64 Things Every Geek Should Know. If you consider yourself a geek, or aspire to the honor of geekhood, here’s an essential checklist of must-have geek skills.

64 Things Every Geek Should Know

The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. Malicious Linux Commands -

From (This article was originally published in Ubuntu Forums but was removed there.

Malicious Linux Commands -

Ubuntuguide feels that knowledge about these risks is more important than any misguided attempts to "protect the public" by hiding their potential dangers or protect the (K)Ubuntu/Linux image. The original article has therefore been re-created (and subsequently edited) here.) ATTENTION: It is worthwhile to have some basic awareness about malicious commands in Linux. Always be cautious when running one of these (or similar) commands (or downloaded scripts) that have been "recommended" as a solution to a problem you may have with your computer. DOJ Won't Ask Supreme Court to Review Hacking Case. Rudy's Delphi Corner - Console unit. Download I write a lot of console programs to test simple concepts, containing a few test routines and a few Writeln commands.

Rudy's Delphi Corner - Console unit

The NSA has its own team of elite hackers. NSA headquarters at Fort Meade, MD where TAO's main team reportedly works (Wikipedia) Our Post colleagues have had a busy day.

The NSA has its own team of elite hackers

First, they released documents revealing the U.S. intelligence budget from National Security Agency (NSA) leaker Edward Snowden. Then they recounted exactly how the hunt for Osama bin Laden went down. How to install Eclipse 3.7 on Ubuntu 11.04. The Eclipse packages in Ubuntu are are very out of date.

How to install Eclipse 3.7 on Ubuntu 11.04

The latest version in the Ubuntu repos is 3.5.2 where as the latest version of Eclipse is 3.7. I’m posting this because Ubuntu 11.04 uses the new Unity desktop which uses overlay-scrollbars (scrolls bars that are hidden until you hover over them). For some reason Eclipse 5.3.2 doesn’t like to play nice with the overlay scrollbars, and I’d rather use the newest version anyways. With Eclipse, you can just download the tar.gz file from eclipse.org and run it no problem, but I like set things up in a cleaner fashion, so here’s how I did it. 1) Download Eclipse. Bit Twiddling Hacks. By Sean Eron Anderson seander@cs.stanford.edu Individually, the code snippets here are in the public domain (unless otherwise noted) — feel free to use them however you please.

Bit Twiddling Hacks

The aggregate collection and descriptions are © 1997-2005 Sean Eron Anderson. The code and descriptions are distributed in the hope that they will be useful, but WITHOUT ANY WARRANTY and without even the implied warranty of merchantability or fitness for a particular purpose. As of May 5, 2005, all the code has been tested thoroughly. Top 10 Web hacking techniques of 2010 revealed. Network World - A Web hack that can endanger online banking transactions is ranked the No. 1 new Web hacking technique for 2010 in a top 10 list selected by a panel of experts and open voting.

Top 10 Web hacking techniques of 2010 revealed

Called the Padding Oracle Crypto Attack, the hack takes advantage of how Microsoft's Web framework ASP.NET protects AES encryption cookies. FROM THE SECURITY WORLD: Quirky moments at Black Hat DC 2011 If encryption data in the cookie has been changed, the way ASP.NET handles it results in the application leaking some information about how to decrypt the traffic. With enough repeated changes and leaked information, the hacker can deduce which possible bytes can be eliminated from the encryption key. Hacker Family Tree Charts Hacker Group Origins And Relations. Bypass The Security: Wireless Hacking Basics. MD5 considered harmful today. The bytes 0 - 473 in the real certificate (the fields up to the modulus, and the first 5 bytes of the modulus field which are a predictable header) are pretty much fixed by CA requirements. Those 474 bytes form the "chosen prefix" on the real certificate's side. For this certificate we chose to have a 2048 bit RSA key.

The main reason for this size is the fact that we have to hide the collision block in there. Unsafe at Any Bitrate News. How Apple and Amazon Security Flaws Led to My Epic Hacking. In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook. Infinity Exists. I Got My Computer Back! June 4th, 2009 by Patchy It’s been several years,… but finally Patchy and his computer are reunited at last Download Here Posted in News, Vblog | 9 Comments Email Injection June 2nd, 2009 by. Hacktivism: Civil Disobedience or Cyber Crime? A man attends a demonstration organized by hacker collective Anonymous in Tokyo, July 7, 2012.

Hackers claim 12 million Apple IDs from FBI. MJM as Personified Evil Says Spyware Saves Lives Not Kills Them. In the secretive world of surveillance technology, he goes just by his initials: MJM. His mystique is such that other security professionals avoid using wireless Internet near him. MJM himself suggests that those he meets allay their paranoia by taking batteries out of their mobile phones.

Special Report: Unsafe at Any Bitrate MJM -- Martin J. Muench -- is the developer of Andover, U.K. How To Remain Connected If Your Internet Gets Shut Off. - Knowledge Should be Shareable Software Tricks, Tips and Hacking. A Box For Manipulating The News On Other People’s Computer Screens. Aaron Swartz. How to Hide Data in Image, Audio & Video Files: Steganography. Jeremy Hammond. Running Mantra and Firefox together.

3 Hacks for Firefox That Will Double Your Internet Browsing Speed - Gnoted.com. There are many people out there complaining about the Firefox RAM Memory Bug. Lets get it straight. Jeremy Hammond's Sentencing Statement. On eve of incarceration, Anonymous hacker clears the air. REVEALED: Hundreds of words to avoid using online if you don't want the government spying on you.

Department of Homeland Security forced to release list following freedom of information requestAgency insists it only looks for evidence of genuine threats to the U.S. and not for signs of general dissent. Statement From @ItsKahuna. Top 15 Open Source/Free Security/Hacking Tools. 70 Things Every Computer Geek Should Know. Stuxnet has infected a Russian nuclear plant and the space station [Updated] Teenage Hacker "Cosmo the God" Sentenced by California Court. Hacker (programmer subculture) iPad Hack Statement Of Responsibility. Hackers by National Geographic.

5 Computer Hacks from Movies You Won't Believe Are Possible. Patients' own heartbeat could work as anti-hacking password for implants. Hacking Secret Ciphers with Python. Google hacks. Meet The Hackers Who Sell Spies The Tools To Crack Your PC (And Get Paid Six-Figure Fees) Use These Secret NSA Google Search Tips to Become Your Own Spy Agency. Penetration Testing and Vulnerability Analysis. Automotive takeover schemes to be detailed at Defcon hacker conference. A Saudi Arabia Telecom's Surveillance Pitch. BeTheBot. Shopping For Zero-Days: A Price List For Hackers' Secret Software Exploits.

Google hacking master list. Free DNS tunneling service. Hacker Demonstrates Android Smartphone App To Hijack A Plane Midair. Hacktivists on Trial. How Antisec Died — Notes from a Strange World. Dorks & hacks Big list. How To Become A Hacker. Hack Google Chrome Passwords. Hack a Computer. How to use Google for Hacking. Unraveling The Stuxnet Virus. "The Konscience of a Kourier" How to use Google for Hackiing. Now Anyone Can Hack A Website. The Best Hacking Tutorial Sites - Learn Legal Hacking. Meet Dark Tangent, the hacker behind Black Hat and DEF CON. Fast-Talking Computer Hacker Just Has To Break Through Encryption Shield Before Uploading Nano-Virus.

How to Hack a Web Site - Dr. Susan Loveland - Lunchtime Talks in Science and Mathematics. 8 Things You Won't Believe Can Be Hacked. The Best Hacking Tutorial Sites. How to Crack the Account Password on Any Operating System. Password Secrets of Popular Windows Applications. “I’m Going To Prison For Arithmetic” Andrew Auernheimer aka Weev.

7 Most Notorious Computer Hacker Groups of All Time. Hack Attack: Turn your $60 router into a $600 router. An Incredible Way to Reveal Passwords Behind Asterisks. Hackers Said to be Planning to Launch Own Satellites to Combat Censorship. A Brief History of Hackerdom. Without Computer Security, Sources’ Secrets Aren’t Safe With Journalists.

"The Conscience of a Hacker" How to Hide Data in Image, Audio & Video Files. How to Unlock a Computer Without a Password Reset Disk. Ghost in the Wires - By Kevin Mitnick - Book Review - NYTimes.com - What is a Hacker. International hacktivists help Syrian citizens circumvent Internet censorship. Software gives visual representation of who’s following you online.