background preloader

InterN0T - Underground Security Training

InterN0T - Underground Security Training

Thisislegal.com The Open Organisation Of Lockpickers :: Meetings This is a repository of the most up-to-date versions of Deviant's lock diagrams and animations. Seen in all of the TOOOL educational materials and slide decks, these files are all released under the Creative Commons license. You are free to use any of them for non-commercial purposes, as long as they are properly attributed and the same freedom for others is maintained in all derivative works. Please note that these diagrams have evolved and developed over time. Lock Basics and Mechanical Operation How pin tumblers are arranged and how locks operate (or fail to) with conventional keys Introduction to Lockpicking Overview of why lock picking is possible and the use of basic pick tools Manipulation-Resistant Locks Spool pins, mushroom pins, and other ways of increasing security Diagrams of Bumping Attacks Animations showing how snapping guns and bump keys work Key Impressioning Many detailed, step-by-step diagrams and animations detailing the process of key impressioning Master Diagrams

The War On Cyber CyberTerrorists - The War On Cyber: CyberTerrorists - The War On Cyber Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. Subscribe to topics and forums to get automatic updates Welcome to CyberTerrorists - The War On Cyber, like most online communities you must register to view or post in our community, but don't worry this is a simple free process that requires minimal information. Looking for Developers !! Autodesk Revit Structure 2012 Build 2315 + Portable by Today, 05:46 AM Application Pack for iPad and iPhone by Today, 05:16 AM p777 God z da Shortest distance from Zero to INFiNiTY.........!!! locon i want access to TRACK2.NAME ONLINE DUMP SHOP Toggle this category ..:: CT Global Rules, Announcements, News & Feedback ::.. Forum Rules & Announcement, Read RULES before Posting any kind of thing here.

Vote Now! Top Ten Web Hacking Techniques of 2011 Every year the Web security community produces a stunning amount of new hacking techniques published in various white papers, blog posts, magazine articles, mailing list emails, etc. Within the thousands of pages are the latest ways to attack websites, Web browsers, Web proxies, and so on. Beyond individual vulnerability instances with CVE numbers or system compromises, we’re talking about actual new and creative methods of Web-based attack. The Top Ten Web Hacking Techniques list encourages information sharing, provides a centralized knowledge-base, and recognizes researchers who contribute excellent work. How the winners were selected… Phase 1: Open community voting (Ballot) [COMPLETE] From of the field of 51 total entries received listed below, each voter (open to everyone) ranks their fifteen favorite Web Hacking Techniques using a survey. (they’ll be deleted) Voting will close at the end of the day this Monday, February 20. [CLOSED] The more people who vote, the better the results!

How to Totally Troll someones Computer [pic] Email If you have ever wanted to carry out the ultimate practical joke using someone’s computer as your tool then this guide on how to troll a persons computer is something that you must read. For more hints, tips, news and all things technology and geek related please follow us on Facebook or Twitter or subscribe to our feed. [via - neatoroma] Be Sociable, Share! Related posts: The Family Tree of Sherlock Holmes Holmes fans...Munch on. The Purpose of this article to collect all of the available information about the family of Sherlock Holmes. Wherever possible I have given correct names but it has been necessary to fill in gaps. The obvious place to start is at the Wold Newton meteor strike present were Dr Siger (1) Holmes and his wife Violet(1) Clarke (a descendant of Micah Clarke) As far as I have been able to determine the couple had only one child Mycroft (1) Holmes who married Violet (2) Vernet. Mycroft (2) married Violet (3) Sherrinford daughter of Sir Eric Sherrinford. Siger (2) married Violet (4) Rutherford. Shirley (1) married Charles Jones after her much fictionalised adventure titled"The Adventure of Sherlock Holmes Dumber Sister in the Case of the Mislaid Pussy"( in GAME magazine Juy 1976). Unfortunately, Jupiter's parents died when he was very young and he was raised by his Uncle Titus Jones and his wife Mathilda. The third son Sebastion married awoman named Peggy.

HellBound Hackers Slideshow: Places To Hide Cash If you’re like most people, you keep your money in the bank (or several banks). But you may also want keep a little stash at home, so that it’s easily accessible in case of an emergency. It used to be a habit we associated with our grandparents, but after the banking crisis of 2008 and 2009, even young consumers started keeping at least some of their cash within reach. Companies that manufacture and sell home safes reported significant sales spikes during the recession, a trend that wasn’t unusual: during tough, uncertain times, people prefer to keep their money where they can see it. Not everyone wants to spend a couple hundred dollars or more on a home safe, though.

Infinity Exists I Got My Computer Back! June 4th, 2009 by Patchy It’s been several years,… but finally Patchy and his computer are reunited at last Download Here Posted in News, Vblog | 9 Comments Email Injection June 2nd, 2009 by Now that I finally got rid of WP-Forum, I can show you guys an Email Injection flaw that existed in that forum. Posted in Vblog | No Comments Infinity Exists Updates!! Nox and I haven’t made any new Full Disclosure episodes in a while because we have been busy with school. No Comments Underground – Local File Inclusion May 27th, 2009 by Ground Zero’s Underground Video demonstrates how to use Local File Inclusion (LFI). If you would like to submit a video to Infinity Exists Underground send an email describing your video to underground@infinityexists.com Posted in Underground | No Comments Underground – Windows Privilege Escalation May 26th, 2009 by In this Underground Video, Crash Overron explains a simple way to escalate privileges in Windows XP. 4 Comments Jerry Sanders Design Competition

hackergames.net 6 Things Men Do To Get Laid That Science Says Turn Women Off You may not realize this, but Cracked.com is all about getting you laid. Sometimes this is pretty obvious -- like when we give explicit dating advice or explain the mystical forces that secretly govern our libidos -- but even when we're talking about the horrible ways sex can go wrong, we're still hoping you can use the information we're sharing as an icebreaker to convince an attractive colleague to come back to your humble apartment and get freaky with kitchen utensils (we're not judging). And in this Cracked Classic, we continue that noble tradition by reminding our male readers that some of their trusty "moves" are secretly sabotaging their bone-tential. So absorb this knowledge and go forth, trusty readers. Use our gifts of knowledge to bone. As we mentioned in this article, attracting a woman can be so easy you don't even realize you're doing it. Unfortunately, it turns out there are just as many things you're doing to repel women, again without even knowing it. See?

Related: