background preloader

How to Hack a Web Site - Dr. Susan Loveland - Lunchtime Talks in Science and Mathematics

How to Hack a Web Site - Dr. Susan Loveland - Lunchtime Talks in Science and Mathematics
Related:  Hmm?

The Elite Hackers Site - By Schiz0id - Learn how to become an elite hacker today! Richard Stallman: Snowden & Assange besieged by empire but not defeated Egyptian Chronicles Power Over Ethernet Router Conversion The idea driving this project is to turn any standard, off-the-shelf router into a Power Over Ethernet (PoE)-capable (Wikipedia Description)[] unit without buying any adapters or additional hardware. PoE is somthing fairly common in many business/office spaces. For example, many wireless access points in office buildings and universities use the technology so they don't have to run a power receptacle to wireless access points. For this instructable though, we're going to use PoE in a residential setting. Even the big router companies are starting to sell these adaptors to consumers like this Linksys WAPPOE12. But I think it costs way too much and is kinda bulky. Applications for this instructable are up to your imagination. In my case, I will be using a 5 year-old WIRED router that I had lying around. To begin we'll need some basic things:1.

XSS (Cross Site Scripting) Cheat Sheet Last revision (mm/dd/yy): 07/4/2018 This cheat sheet lists a series of XSS attacks that can be used to bypass certain XSS defensive filters. Please note that input filtering is an incomplete defense for XSS which these tests can be used to illustrate. Basic XSS Test Without Filter Evasion This is a normal XSS JavaScript injection, and most likely to get caught but I suggest trying it first (the quotes are not required in any modern browser so they are omitted here): XSS Locator (Polygot) The following is a "polygot test XSS payload." javascript:/*--></title></style></textarea></script></xmp><svg/onload='+/"/+/onmouseover=1/+/[*/[]/+alert(1)//'> Image XSS using the JavaScript directive Image XSS using the JavaScript directive (IE7.0 doesn't support the JavaScript directive in context of an image, but it does in other contexts, but the following show the principles that would work in other tags as well: No quotes and no semicolon Case insensitive XSS attack vector HTML entities Malformed A tags <! <!

Top 100 Network Security Tools Documentales y películas sobre hacktivismo. En los últimos días hemos cubierto muchas noticias relacionadas con Wikileaks, Edward Snowden y Pirate Bay. A la vez que estos hechos están sucediendo en el presente, existen algunos documentales y películas sobre hacktivismo que pueden ayudarte a tener una visión más global de cómo han ido sucediendo los acontecimientos. Debido a los últimos acontecimientos de Wikileaks y Pirate Bay, os presento una lista con algunos de los documentales y películas más destacados de ambas organizaciones. Wikileaks WikiLeaks es una organización mediática internacional sin ánimo de lucro, que publica a través de su página web informes anónimos y documentos filtrados con contenido sensible en materia de interés público, preservando el anonimato de sus fuentes. WikiRebels es un documental realizado por la televisión pública sueca que recoge un seguimiento a Wikileaks desde el verano del 2010 hasta finales de ese mismo año. The Pirate Bay Es el mayor tracker de BitTorrent a nivel mundial.

How to Convert an Old PC into a Modern Server Your old desktop PC gave you years of reliable service, but eventually it couldn't keep up with modern tasks and applications; so you went out and bought something newer and faster. Now you need to decide what to do with the old clunker. You could e-recycle it--hand it off to a responsible company that will dismantle it and recycle the parts--but what do you gain from that aside from feeling good about being environmentally responsible? Allow us to suggest another solution: Repurpose the old hulk as a local server. You can use it as a repository for automatic PC backups, or set it up as a file server that you and your employees can access while you're on the road. Best of all, the software--FreeNAS--that will power this machine is exactly what its name describes: a free operating system for network-attached storage. Installing FreeNAS Before you begin your FreeNAS installation, obtain a USB thumb drive with a capacity of at least 2GB. Setting Up Your Storage

Geek School: Learn How to Automate Windows with PowerShell In this edition of Geek School, we will be helping you understand the powerful PowerShell scripting language that is built right into Windows, and is extremely useful to know in an IT environment. While this series is not structured around an exam, learning PowerShell is one of the most important things you can do as a network administrator, so if there is one thing you want to learn to help your IT career, this is it. Plus, it’s a lot of fun. Introduction Please note that this series is based on PowerShell 3, which ships with Windows 8 and Server 2012. If you are running Windows 7 please download the PowerShell 3 update before you continue. Meet the Console and the ISE There are two ways of interacting with PowerShell out of the box, the Console and the Integrated Scripting Environment – also known as the ISE. As you can see the ISE sports a split view so that you can rapidly script while still being able to see the result in the lower half of the ISE. Using the Help System Update-Help .

64 Things Every Geek Should Know « Caintech.co.uk If you consider yourself a geek, or aspire to the honor of geekhood, here’s an essential checklist of must-have geek skills. The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. USB – Universal Serial BusGPU – Graphics Processing UnitCPU – Central Processing UnitSATA – Serial ATAHTML – Hyper-text Markup LanguageHTTP – Hypertext Transfer ProtocolFTP – File Transfer ProtocolP2P – Peer-to-peer sharing (See 2. 1. 3. Here’s what one looks like: 4. 5.

Top 15 Security/Hacking Tools & Utilities 1. Nmap I think everyone has heard of this one, recently evolved into the 4.x series. Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. Can be used by beginners (-sT) or by pros alike (–packet_trace). Get Nmap Here 2. Recently went closed source, but is still essentially free. Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Get Nessus Here 3. Yes, JTR 1.7 was recently released! John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. You can get JTR Here 4. Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Get Nikto Here 5. Get SuperScan Here 6. p0f 7. 8.

Entrevista – Dr. Michio Kaku | abril 11, 2008 -- por: Hernán Ortiz Michio Kaku, respetado físico teórico especializado en la teoría de las cuerdas, co-fundador de Theory, autor de los libros: Hiperespacio, Visiones: Cómo , Mundos Paralelos, y en el Siglo XXI y Beyond Einstein (con Jennifer Trainer), así como de numerosos textos de doctorado que son de lectura obligatoria en las universidades más importantes del mundo; divulgador científico, presentador de radio y documentales de televisión (¿quién no lo ha visto alguna vez en Discovery?) John DeNardo de SF Signal, tuvo la oportunidad de preguntarle al Dr. Kaku sobre su trabajo, la ciencia ficción y su nuevo libro, y me ha autorizado para traducir la entrevista. SF Signal: En su libro, Hyperspace, usted pisó los complejos terrenos de las dimensiones superiores y explicó –en términos simples– cómo concebir las seis dimensiones más allá de Alto, Ancho, Profundidad y Tiempo. ¿Cuál es su filosofía personal para explicar la ciencia con un lenguaje simple?

Related:  Security