background preloader

Locate IP Address Lookup Show on Map City of the IP

Locate IP Address Lookup Show on Map City of the IP

Using Serials, Cracks & Keygens OK, so you’ve downloaded some great software, and you can’t figure out how to get it to work. In general there are only three methods that all ‘Release Groups’ adhere to for getting that illicit piece of software or game to good use: Serial numbers, cracks and key generators. In a proper release, there is always an information file that accompanies the release (an *.NFO file). It is here that information can be found about how to get the software working normally.

Exploit writing tutorial part 1 : Stack Based Overflows Last friday (july 17th 2009), somebody (nick)named ‘Crazy_Hacker’ has reported a vulnerability in Easy RM to MP3 Conversion Utility (on XP SP2 En), via (see The vulnerability report included a proof of concept exploit (which, by the way, failed to work on my MS Virtual PC based XP SP3 En). Another exploit was released just a little bit later. Nice work. You can copy the PoC exploit code, run it, see that it doesn’t work (or if you are lucky, conclude that it works), or… you can try to understand the process of building the exploit so you can correct broken exploits, or just build your own exploits from scratch.

Top 10 Things You Can Upgrade with a Little Electronics Hacking it is a skill to do a good solder joint, it comes with LOTS of practice. so most people who rarely do it will ever get good at it. Bingo. Of course, part of the issue is having a soldering iron at the right temp with a properly tinned tip. Vulnserver Originally introduced here , Vulnserver is a Windows based threaded TCP server application that is designed to be exploited. The program is intended to be used as a learning tool to teach about the process of software exploitation, as well as a good victim program for testing new exploitation techniques and shellcode. What’s included? The download package includes the usual explanatory text files, source code for the application as well as pre compiled binaries for vulnserver.exe and its companion dll file. Running Vulnserver To run vulnserver, make sure the companion dll file essfunc.dll is somewhere within the systems dll path (keeping it in the same directory as vulnserver.exe is usually sufficient), and simply open the vulnserver.exe executable.

Introducing Vulnserver Vulnserver I have just released a program named Vulnserver - a Windows based threaded TCP server application that is designed to be exploited. Why did I write this? Bypassing AntiVirus Detection for Malicious PDFs Introduction Recently I had to get a malicious PDF file past a virus scanner as part of a penetration test, and I thought I would share the process I used to do it. But before I do so, lets get the standard disclaimer out of the way... CISPA is Back: FAQ on What it is and Why it's Still Dangerous UPDATE (4/22/13): The Cyber Intelligence Sharing and Protection Act (CISPA) has passed the House of Representatives with amendments. This FAQ reflects the bill prior to the amendments. We will be updating this post as we review the bill. In the meantime, please refer to the version of the bill (PDF) that passed the House. The privacy-invasive bill known as CISPA—the so-called “cybersecurity” bill—was reintroduced in February 2013. Just like last year, the bill has stirred a tremendous amount of grassroots activism because it carves a loophole in all known privacy laws and grants legal immunity for companies to share your private information.

After denouncing SOPA and PIPA, how can Facebook support CISPA? Update - Facebook says it has 'no intention' to abuse CISPA When the Internet erupted earlier this year to rally against the U.S. anti-piracy legislation Stop Online Piracy Act (SOPA) and PROTECT IP Act (PIPA), Facebook joined in. Facebook co-founder and CEO Mark Zuckerberg, Facebook COO Sheryl Sandberg, and Facebook VP Elliot Schrage all posted their criticisms of the bills. Zuckerberg even tweeted about it – a very rare occurrence. Now, Facebook is supporting the Cyber Intelligence Sharing and Protection Act (CISPA), which was written to "provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity entities, and for other purposes." CISPA isn't exactly like SOPA or PIPA, but it's still a cause for concern, according to activists like the Electronic Frontier Foundation (EFF).

OK, Cupid: giving your love life to Google Glass and the hive mind 32inShare Jump To Close On January 20, 2013, sometime before 7:45PM, Lauren McCarthy sat down at a table. She was early. This Facebook page you like is actually spam Aly Monique spends her days studying nursing in Chicago, but at night she plays a stylist online. At the social-shopping site Polyvore, she creates fashionable ensembles with chic bags and cute designer dresses and sexy shoes. She has no training in the art of style, but the numbers prove her talent.