How do I hack source code? [Archive] Wybiral December 17th, 2006, 11:34 PM Well, you have to specify which language it was written in. If it is open source, you don't have to do anything... objdump py2d.so -s The lowercase s will give you all of the hex bytes in the file. objdump py2d.so -S The capital S is for the assembly dump. Unfortunately, there aren't disassembly programs that can completely recover the source, so you can really only use this to find small routines, and even then they have been optimized by the compiler and wont be much help. But, if you're luck your program will be in python or something, or it will be open source. Oh yeah, if you need a good hex editor, GHex is for gnome and it works great!
Exploit Shellcode, linux shellcode, windows shellcode Currently archiving 29120 exploits Updated (CVE and Archive): Sat Apr 12 2014 <<prev12345678910next>> Infinity Exists » Videos Episode 24 – Bypass Hotspot’s Access Controls July 14th, 2009 by Patchy In this episode, we demonstrate three ways to Bypass Hotspot’s Access Controls. Video Stream Here Download Here Download ptunnel.exe Posted in Videos | 14 Comments Episode 23 – Cracking WEP Update December 10th, 2008 by In this episode of Full Disclosure, Nox and I describe four improved methods of cracking WEP encryption: the ARP Request Replay Attack, Fragmentation Attack, Caffe Latte Attack, and Hirte Attack. Live Stream Here Download Here 3 Comments Episode 22 – Playstation 2 Softmod October 14th, 2008 by In Episode 22, Nox and I show you how to softmod your old Playstation 2 to enable you to run third party software. Requirements for the Softmod: Live Stream Here Download Here 3 Comments Episode 21 – XSS Tunnel August 22nd, 2008 by XSS Shell is a cross-site scripting backdoor into the victim’s browser which enables an attacker to issue commands and receive responses. Live Stream Here Download Here Download XSS Shell and Tunnel
I hacked my secure wireless network: here’s how it’s done Wireless networks are everywhere; they are widely available, cheap, and easy to setup. To avoid the hassle of setting up a wired network in my own home, I chose to go wireless. After a day of enjoying this wireless freedom, I began thinking about security. How secure is my wireless network? I searched the Internet for many days, reading articles, gathering information, and participating on message boards and forums. I soon came to the realization that the best way for me to understand the security of my wireless network would be to test it myself. How a wireless network works A wireless local area network (WLAN) is the linking of 2 or more computers with Network Interface Cards (NICs) through a technology based on radio waves. Access points are base stations for the wireless network. The set of all stations that communicate with each other is referred to as the Basic Service Set (BSS). Data streams, known as packets, are sent between the Access Point, and it’s clients. Packets and IVs
Joint Test Action Group Joint Test Action Group (JTAG) is the common name for the IEEE 1149.1 Standard Test Access Port and Boundary-Scan Architecture. It was initially devised by electronic engineers for testing printed circuit boards using boundary scan and is still widely used for this application. Overview JTAG was an industry group formed in 1985 to develop a method to test populated circuit boards after manufacture. At the time, multi-layer boards and non-lead-frame ICs were becoming standard and connections were being made between ICs which were not available to probes. The industry standard finally became an IEEE standard in 1990 as IEEE Std. 1149.1-1990 after many years of initial use. Debugging Although JTAG's early applications targeted board level testing, the JTAG standard was designed to assist with device, board, and system testing, diagnosis, and fault isolation. Storing firmware JTAG programmers are also used to write software and data into flash memory. Primitives
- StumbleUpon Wireless is everywhere and routers are the force that makes it happen, so why not supercharge yours to take proper advantage of it? DD-WRT will let you boost your router’s range, add features, and more. DD-WRT has a ton of features—more than we can cover in this guide, which is focused on helping you get your router upgraded. What Is DD-WRT? Here’s our router. DD-WRT is an open-source alternative firmware for routers. Router Support Turning your home router into an almost professional-level tool is a great project that has one major caveat: support. For our purposes, the important spec to consider is NVROM, or ROM. Preparation The most important thing in any project is research. DISCLAIMER: Changing your router’s firmware can result in unintentional consequences, such as “bricking.” As mentioned above, start with the Supported Devices page to see if you’ve got a DD-WRT-friendly router. The friendly forum gave us some useful info for our particular model. The Process
How to Control a Remote Computer using Lost Door | Hacking Truths Remote Administration tools also known as RAT are windows Trojans or in simple terms programs used by a Hacker to get administrative privileges on the victim’s computer. Using a RAT you can do a lot of cool things such as “Upload, delete or modify data” , “Edit registry”, “Capture victim’s screen shot”, “Take control of victim’s Computer”or “Execute a virus” just with a click of a button. Throughout this article I will teach you how to use Lost Door, a Windows RAT, to control and monitor a victim’s computer remotely. Disclaimer: Coder and related sites are not responsible for any abuse done using this software. Follow the steps below to setup a server for Lost Door. Download Lost Door from here . ( Update: In case the given download link doesn’t work, use this secondary download link . On executing the download file, you will see the following screen. After it is open, right click on the window and click on create server Now enter your IP address and DNS here. Now go to ‘Advanced’ Tab.
How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. Numerous translations of this document are available: ArabicBelorussianBulgarianChinese, Czech. The five-dots-in-nine-squares diagram that decorates this document is called a glider. If you find this document valuable, please support me on Patreon. The Jargon File contains a bunch of definitions of the term ‘hacker’, most having to do with technical adeptness and a delight in solving problems and overcoming limits. The hacker mind-set is not confined to this software-hacker culture. If you want to be a hacker, keep reading. 1. 2.
JTAG Tutorial Since its introduction as an industry standard in 1990, boundary-scan (also known as JTAG) has enjoyed growing popularity for board level manufacturing test applications. JTAG has rapidly become the technology of choice for building reliable high technology electronic products with a high degree of testability. Due to the low-cost and IC level access capabilities of JTAG, its use has expanded beyond traditional board test applications into product design and service. This article provides a brief overview of the JTAG architecture and the new technology trends that make using JTAG essential for dramatically reducing development and production costs, speeding test development through automation, and improving product quality because of increased fault coverage. The article also describes the various uses of JTAG and the tools available today for supporting JTAG technology. What is JTAG? A Brief History of JTAG Figure 1 - Typical JTAG Device Figure 2 - Interconnect Test Example
Love Thy Neighbor but hack his Wi-Fi My neighbor works for a fortune 500 company. I don’t know what he does exactly but he got a 10mbps internet connection attached to his WiFi router. He is mostly not home till late in the evening. so all this bandwidth sits idle all day. such a waste! I did try to connect to this router many times but it kept asking for a password. And, by the way, I am his neighbor too… and he even won’t share his Wi-Fi with me.. what and A*s. So, My quest for hacking my neighbor’s Wi-Fi (For Educational Purpose Only) has begun, I have done some initial research and found that I would need following tools CommView for Wi-FiWEP Key RecoveryAircrack-NG Let’ me find them on some forums etc… Install Commview, then paste the included “cv.exe” to the directory you installed it to (c:program filescommviewwifi)Open commview and install the commview drivers to a card.