background preloader

Exploits Database by Offensive Security

https://www.exploit-db.com/

Related:  Hacking

Comment hacker un système informatique: 12 étapes Catégories: Informatique | Programmation Autres langues : English: Hack, Español: hackear, Português: Hackear, Italiano: Hackerare, Русский: стать хакером, Deutsch: Einen Computer "hacken", 中文: 成为黑客, Bahasa Indonesia: Meretas, Čeština: Jak hackovat, Nederlands: Leren hacken, 한국어: 해킹하는 법 The beginning of a new era? Sometimes, there are updates or breakthroughs in video-games and other pieces of technologies that provide a new and moreintuitive way to play the game. I, for one, think Minecraft has reached a new era. It started with creative workingonwardto survival and then multiplayer survival, then modifications, redstone, The Nether, and now pistons. Pistons brings a whole newapproachto play Minecraft, let alone spend hours seeing the creative ways people have already spent messing around with it. I think Minecraft has entered a new era.

Cain & Abel Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol's standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some "non standard" utilities for Microsoft Windows users. The latest version is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs and Man-in-the-Middle attacks.

The Infection File Popularity Contest - SpywareGuide Greynets Bl Ever wondered exactly how people who enjoy putting malicious files into the wide blue yonder ensure their bundles of joy are as attractive as possible to those who would happily download them? Well, I came across this program today and thought it was worth looking into. It dips into what's hot and current in the world of free downloads then uses that to ensnare as many potential victims as possible.

SSH Tunneling What is SSH ? SSH stands for “Secure Shell”, It used to create a secure connection between two computers. SSH supplies a command line interface for remote administration/management of Linux based systems or even CISCO routers, It allows us to securely perform various maintenance tasks and more…basically we can think of it as “secured telnet”. SSH communication consists of a SSH Server and a SSH Client. So what SSH Tunneling is ? We can use SSH to create an encrypted communication channel to tunnel unencrypted traffic trough (for example POP3 ).SSH also supports port forwarding which enables ssh to pass incoming traffic to specified hosts and ports.In this tutorial we will take a look at various scenarios and uses for SSH.

Metasploit Metasploit is a penetration testing platform that enables you to find, exploit, and validate vulnerabilities. The platform includes the Metasploit Framework and its commercial counterparts, such as Metasploit Pro. The Metasploit Framework is the foundation on which the commercial products are built. It is an open source project that provides the infrastructure, content, and tools to perform penetration tests and extensive security auditing. Thanks to the open source community and Rapid7's own hard working content team, new modules are added on a regular basis, which means that the latest exploit is available to you as soon as it's published. There are quite a few resources available online to help you learn how to use the Metasploit Framework; however, we highly recommend that you take a look at the Metasploit Framework Wiki, which is maintained by Rapid7's content team, to ensure that you have the most up to date information available.

5 Little-Known Websites That Will Save You Time and Money When Booking Airfare Online This article is by staff writer Adam Baker. Baker recently reflected on just how much money affects our internal values. When booking airfare online, most people think of the popular online aggregation sites. You know the ones: They have the fancy commercials, catchy jingles, and washed-up celebrity pitchmen. While those sites aren’t inherently bad, there are a few well-documented problems with relying solely on these larger engines:

How to hide files in JPEG pictures If you’re looking to hide files on your PC hard drive, you may have read about ways to encrypt folders or change the attributes on a file so that they cannot be accessed by prying eyes. However, a lot of times hiding files or folders in that way requires that you install some sort of software on your computer, which could then be spotted by someone else. I’ve actually written quite a few articles on how you can hide files and folders in Windows XP and Vista before, but here I’m going to show you a new way to hide files that is very counter-intuitive and therefore pretty safe! Using a simple trick in Windows, you can actually hide a file inside of the JPG picture file! You can actually hide any type of file inside of an image file, including txt, exe, mp3, avi, or whatever else.

Related:  reptosblizzarevisualvidyamayuragnihotribean444Forensic