background preloader

Root Secure Index

Root Secure Index

http://www.rootsecure.net/content/downloads/pdf/?C=S;O=A

Related:  Hacker Sites / Blogs / ForumsHackingComputer Securityhacking & cyberactivism

Cheat Engine Features[edit] Cheat Engine can inject code into other processes and as such most anti-virus programs mistake it for a virus. There are versions that avoid this false identification at the cost of many features (those which rely upon code injection). LinkedIn vs. password cracking password hashes right now, so I thought I'd do a live blog of the steps I'm doing. As I do each step, I'll update this blog live. When you reach the end, chances are good I'll be updating it again in a few hours.

Bruce Schneier on how to choose secure passwords Part of my job requires asking for people's passwords for their computer. in order to do diagnostics & repair. They don't have to provide it if they don't want to. I can think of one person who opted for this, and he was a software developer, he encrypted everything, he had good backups — most people don't do that, either — and he preferred to have everything deleted rather than give out the password. Fair enough, all prudent practices. They're welcome to change it to a dummy value — blank, a dictionary word, etc — and change it back afterwards. The percent that opts for this is probably in the single-digits. 5 Fun things To Do on School Computers - Dave Pagurek November 26th, 2010 I know it's been a while, but I'm reinstating my weekly blog post policy. This week will be about something I've wanted to write about for a while: School computers!

Top 15 Open Source/Free Security/Hacking Tools 1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Hacker uses an Android to remotely attack and hijack an airplane The Hack in the Box (#HITB2013AMS) security conference in Amsterdam has a very interesting lineup of talks [pdf]. One that jumped out was the Aircraft Hacking: Practical Aero Series presented by Hugo Teso, a security consultant at n.runs in Germany. According to the abstract, “This presentation will be a practical demonstration on how to remotely attack and take full control of an aircraft, exposing some of the results of my three years research on the aviation security field. The attack performed will follow the classical methodology, divided in discovery, information gathering, exploitation and post-exploitation phases.

Screenshot Tour: How to crack a Windows password with Ophcrack Live CD There are simpler ways to "crack" a password. First you could try mspassview which you can download from Microsoft's website. It kinda assumes you already have limited access to the computer in question and the the antivirus/firewall can be turned off. (norton tends to catch it). Painfully Computer Pranks ~ Computer Hacking Computer pranks to freak out your friends and make them crying for mummy I've been posting many articles about computer pranks on this blog (Deadly Virus Prank, The Ultimate Virus, How to Create a Fake and Harmless Virus and Facebook Virus Prank). Today , I will show you 5 great computer pranks that will frustrate your victims very much. These pranks could be very painfully, so please use them at your own risk ;)

ShellNoob 1.0 - a shellcode writing toolkit Today I'm really happy to publicly release ShellNoob (and to publish my first blog post :-)) During the many CTFs I played, there always has been the need to manually write some shellcode (yep, most of time Metasploit is not enough, even if you are lucky and you get a working shellcode...) Now, writing shellcode is always super fun, but some parts are extremely boring and error prone. And after googling for the n-th time "how to I bet that there are tons of similar scripts around the web, but I never found anything that had all the features I wanted.

How to hack a computer with IP address There are plenty of papers out there that go into how to obtain an IP Address from the preferred mark of your choice. So I’m not going to go into that subject. Alright so say we got the targets IP Address finally. What do we do with this IP Address. Well first ping the IP Address to make sure that its alive. 7 Most Notorious Computer Hacker Groups of All Time With the recent attack on PlayStation Network and a bunch of high-profile websites, computer hackers are back in the limelight again. Hackers and hacker groups were quite famous in the 80’s and 90’s but their popularity started fading since the Y2K days. Today, we are once again witnessing hackers threatening to take on giant corporations sending chills down everyone's spine. We have already featured here some of the most infamous black hat hackers of all time. This time, we will take a quick look at some of the most notorious computer hacker groups that ever existed: Masters of Deception

Hackers Hut: Exploiting the heap NextPreviousContents 11. Exploiting the heap Sometimes the buffer that overflows is not a local buffer on the stack, but a buffer obtained from malloc() and freed with free(). Let us do a small demo. NSA has VPNs in Vulcan death grip—no, really, that’s what they call it The National Security Agency’s Office of Target Pursuit (OTP) maintains a team of engineers dedicated to cracking the encrypted traffic of virtual private networks (VPNs) and has developed tools that could potentially uncloak the traffic in the majority of VPNs used to secure traffic passing over the Internet today, according to documents published this week by the German news magazine Der Speigel. A slide deck from a presentation by a member of OTP’s VPN Exploitation Team, dated September 13, 2010, details the process the NSA used at that time to attack VPNs—including tools with names drawn from Star Trek and other bits of popular culture. OTP’s VPN exploit team had members assigned to branches focused on specific regional teams, as well as a “Cross-Target Support Branch” and a custom development team for building specialized VPN exploits. The NSA has a specific repository for capturing VPN metadata called TOYGRIPPE.

Related:  HackingHackStudy hacking-Get smartTorrenting/Pirating/HackingwanderworriesLearning Materialhacks