background preloader

I-Hacked.com Taking Advantage Of Technology

I-Hacked.com Taking Advantage Of Technology

http://www.i-hacked.com/

Main Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks. If you are impatient and want to know how to get started, jump to the Getting Started Tutorial. Aircrack-ng is the next generation of aircrack with lots of new features: More cards/drivers supported More OS and platforms supported WEP dictionary attack Fragmentation attack WPA Migration mode Improved cracking speed Capture with multiple cards Optimizations, other improvements and bug fixing …

What’s My Pass? » The Top 500 Worst Passwords of All Time From the moment people started using passwords, it didn’t take long to realize how many people picked the very same passwords over and over. Even the way people misspell words is consistent. In fact, people are so predictable that most hackers make use of lists of common passwords just like these. To give you some insight into how predictable humans are, the following is a list of the 500 most common passwords.

Agnitio v1.2 released today Hi everyone, I wanted to start today’s blog post by saying thank you to everyone who has downloaded Agnitio so far! Agnitio has been downloaded 1250 times since I released v1.0 104 days ago and with people still downloading both v1.0 and v1.1 nearly everyday that number continues to rise! Business of Life™ April 9, 2014 Suicide in the white professional class You can not underestimate the importance of family and friends in having a good and happy life. This is especially true for professional men. Web World Wide » 50 Free Internet Tools for Tin-Foil Hat Wearers If your wardrobe includes a shiny tin-foil hat, then you will love these free Ma Internet tools. Whether you want to protect yourself from Internet snoopers, want to spy on those out to get you, or want to be able to track trends that you know will lead to something big, then these tools will help you get the job done. Without a Trace

How to make flash drive that copy's users files silently and automatically Ok there is no order in the file creation process just that you have all files created and on the flash drive. I will start out with the autorun.inf. This file is used when you insert the flash drive into said computer. Also used to change the thumb drive icon to something more acceptable for social engineering. Here is the code, you will have to open a simple word editor such as word, you can past this code into word and edit to your hearts content.

Cracking Password Hashes with CPU & GPU Power UPDATE: New video at bottom... Today I am going to tell you about a kick ass tool for cracking hashes on Windows platform that is capable of leveraging the power of your CPU or even better the power of your GPU(s)...or BOTH. I am even going to use a few pictures for a first, hope you like it. The Usability of Passwords (by @baekdal) #tips Security companies and IT people constantly tells us that we should use complex and difficult passwords. This is bad advice, because you can actually make usable, easy to remember and highly secure passwords. In fact, usable passwords are often far better than complex ones. So let's dive into the world of passwords, and look at what makes a password secure in practical terms. Update: Read the FAQ (updated January 2011) Update - April 21, 2011: This article was "featured" on Security Now, here is my reply!

Icons of the Web December 18, 2013: The Nmap Project is pleased to release our new and improved Icons of the Web project! Since our free and open source Nmap Security Scanner software is all about exploring networks at massive scale, we started by scanning the top million web sites for 2013 (as ranked by the analytics company Alexa). We then downloaded each site's favicon—the small icon displayed next to a site title in browser bookmarks and tabs. We scaled the icons in proportion to each site's monthly reach (popularity) and placed them in a giant collage.

Security Digest Features In a world that seems to be losing the notion of journalism, Liquidmatrix Security Digest remains committed to long form articles that dig into the major issues affecting the industry with Feature articles. Click for Features >>>>> Briefings When you don’t know what you’re looking for, Liquidmatrix Security Digest helps you find the most important information quickly with our regular briefings. Hype-Free Update: see this presentation given by Scott Berkun at Google, which which explains my points much more eloquently. Very often media (and I’m using the word “media” here in its most comprehensive way – including things like blogs, Slashdot, etc) tells us the story of some uber-hyper-mega-cool new-unseen-until-now method of performing X. This leads many people to believe that progress is done in “quantum leaps” – ie. there are no intermediate steps between point A (where we are now) and point B (where we can get using this new discovery). As a side-effect, it also makes people think that all they have to do is to come up with a “big idea”. This is utter nonsense and I would like to ask everybody to stop propagating this myth!

Related: