background preloader

Ethical Hacking Tutorials

Related:  Hacking/Cracking - Videos Related To Phreaking Rendre possibles confidentialité et anonymat, pour quiconque et partout Justin Ribeiro / How to use Perl, Tor, and cURL to game an IP check voting engine 10 Jul 2009 Every once in a while I like to spend some time looking at a problem that isn't even a problem. Maybe it's a proof of concept, maybe it's something that just vastly has the potential to be something more. Other times, maybe I just want to game the system just because I can. I can have fun too. Gaming online voting has been around since the invention of online voting. The site in question (which shall remain nameless) had some 50 candidates (ideas one might call them) that could receive votes. Time to load up Tor. To test my IP address restriction theory, I ran Tor, submitted vote again, and it worked. I set this up on Linux. . Since we can now change our identity at will, lets work on the POST. curl -s --socks4a localhost:9050 -e {YOUR_REFERER} -d '{POST_VARS}' -A '{USER_AGENT}' {TARGET_SCRIPT} What exactly is that piece of command line gold doing? This simple command will submit a single vote to a target and return what ever the target script has to offer. I like Perl a lot.

Sécurité informatique, mouchard, espiogiciel, spyware, espionnage, intrusion Cryptocat The Hacker Manifesto by +++The Mentor+++ Written January 8, 1986 Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids. They're all alike. But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? I am a hacker, enter my world... Mine is a world that begins with school... Damn underachiever. I'm in junior high or high school. Damn kid. I made a discovery today. Damn kid. And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... a board is found. Damn kid. You bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. Yes, I am a criminal. I am a hacker, and this is my manifesto.

Technology & Marketing Law Blog by Eric Goldman HackQuest :: Learn about Hacking, Cracking, JavaScript, PHP, Cryptology and Password security GuruMeditation Hacking the Xbox Download "Hacktivism & The Future of Political Participation" May 10, 2006 I'm making my complete dissertation, Hacktivism and the Future of Political Participation, available for download as of today. Depending on your interests, you might want to download the complete manuscript (284 pages) or to look at selected chapters: You can still access chapter summaries and references (with hyperlinks to sources, where available) by using the drop-down menu at top left.

AntiSec and Anonymous: Is Law Enforcement Barking up the Wrong Tree? Image Credit: AnonOps Following a series of high end hacks against US authorities, analysts have come to question whether law enforcement can ever really deal with the Anonymous collective. The debate re-emerged on 3 January after Anonymous posted a link to an MP3 recording of a conference call between the FBI and Scotland Yard. The call chronicled a conversation between the FBI and British authorities discussing the two's ongoing LulzSec and Anonymous investigations. The fact that the majority of the call was spent with each agency sharing the information it had - not all of which was uniform in what it was saying - demonstrated the problem facing law enforcement agencies hunting for Anonymous members. How Deep Does the Rabbit Warren Run? Operating off an open IRC channel, the collective allows any user to join and become a member, or "Anon" as they tend to refer to themselves. Chasing the Wrong Bunny Specifically, Sullivan cited an exchange between Sabu and Weev as proof of his theory.