background preloader

.:[ packet storm ]:. - http://packetstormsecurity.org/

.:[ packet storm ]:. - http://packetstormsecurity.org/

http://packetstormsecurity.com/

Cain & Abel Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol's standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some "non standard" utilities for Microsoft Windows users. The latest version is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs and Man-in-the-Middle attacks.

Technology Network for Java Developers Oracle Technology Network > Java Software Downloads View All Downloads Top Downloads Institute: Reading Room ICS security: SANS needs your input on attacks and threats and how you're preventing and mitigating them in the industrial control systems environments. Share your experiences and enter to win a $400 Amazon gift card! More than 75,000 unique visitors read papers in the Reading Room every month and it has become the starting point for exploration of topics ranging from SCADA to wireless security, from firewalls to intrusion detection. The SANS Reading Room features over 2,650 original computer security white papers in 102 different categories. Auto-Nuke It from Orbit: A Framework for Critical Security Control Automation STI Graduate Student Research by Jeremiah Hainly - March 15, 2017 in Automation, Incident Handling, Free and Open Source Software Over 83% of security teams report that the use of automation in security needs to increase within the next three years (Algosec, 2016). All papers are copyrighted.

How to hide files in JPEG pictures If you’re looking to hide files on your PC hard drive, you may have read about ways to encrypt folders or change the attributes on a file so that they cannot be accessed by prying eyes. However, a lot of times hiding files or folders in that way requires that you install some sort of software on your computer, which could then be spotted by someone else. I’ve actually written quite a few articles on how you can hide files and folders in Windows XP and Vista before, but here I’m going to show you a new way to hide files that is very counter-intuitive and therefore pretty safe! Using a simple trick in Windows, you can actually hide a file inside of the JPG picture file!

Designing Convertbot With the surprising success of Weightbot, it was only a matter of time before we would take on the challenge of outdoing ourselves. We knew people were expecting something big from Tapbots the second time around so what’s more impressive on the iPhone platform than a unit converter? Pretty much anything. In name alone, Convertbot is probably the last application people would expect to see from us. But the truth is, converting units, while extremely ordinary, is a very useful utility for many people. Black Hat ® Technical Security Conference: USA 2010 // Archives Caesars Palace Las Vegas, NV • July 28-29 Event AUDIO & VIDEO: The Source of Knowledge will be onsite to sell audio and video recordings of the Briefings sessions. Their booth will be located outside of the Fourth Floor (Promenade Level), Emperor's Ballroom, or click here to visit the SOK site: order media »

Apple Archives ~ Flyosity by Mike Rundle Entries From The Apple Category: Back when I was doing design work for clients, it seemed like my work would get re-purposed by fledgling and not-so-fledgling designers every month. Sometimes I'd get a tip in my email about a theft that someone saw, or sometimes the offenders would link the assets right off my client's website, but regardless of how I found out about the theft, it'd piss me off more than anything else. I was the one who opened Photoshop, I cranked through iteration after iteration, I thought of execution details in the shower, I stayed up late at night, and then someone else just takes all that work and passes it off as their own. Sure, usually there were some slight modifications, but designers can always tell when someone else is using their design.

Tutorial: Cracking WEP Using Backtrack 3 Standard Disclaimer: This article is provided for informational purposes only. thew0rd.com and its affiliates accept no liability for providing this information. Please only use to test configurations on your own equipment. Accessing WIFI networks that do not belong to you is ILLEGAL. 50 Great Examples of Data Visualization Wrapping your brain around data online can be challenging, especially when dealing with huge volumes of information. And trying to find related content can also be difficult, depending on what data you’re looking for. But data visualizations can make all of that much easier, allowing you to see the concepts that you’re learning about in a more interesting, and often more useful manner. Below are 50 of the best data visualizations and tools for creating your own visualizations out there, covering everything from Digg activity to network connectivity to what’s currently happening on Twitter. Music, Movies and Other Media

Lots of Information about Hacking... and Tool by 3fish May 27

Related: