background preloader

The Black Book of Hacking

The Black Book of Hacking

2600: The Hacker Quarterly CCIA: copyright wiretaps are Hollywood's "PATRIOT Act" Yesterday's White House wish list of new intellectual property laws focused on things like counterfeit medicines, but it also included proposals to extend wiretaps into copyright cases and to ensure that illegal streaming video is a felony. A DC trade group representing companies like AMD, Facebook, Oracle, Yahoo, Google, and Microsoft today objected loudly to the plan, saying that legitimate concerns about counterfeiting have been "hijacked to create draconian proposals to alleviate the content industry of the burden of protecting its own interest using its own extensive resources." And that was just the beginning. Some in Congress and the White House have apparently decided that no price is too high to pay to kowtow to Big Content's every desire, including curtailing civil liberties by expanding wiretapping of electronic communications. That sound you hear is Obama "IP czar" Victoria Espinel scratching Black's name off her Christmas card list.

Cain & Abel Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. Cain & Abel has been developed in the hope that it will be useful for network administrators, teachers, security consultants/professionals, forensic staff, security software vendors, professional penetration tester and everyone else that plans to use it for ethical reasons. The latest version is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs and Man-in-the-Middle attacks.

Related: