Wireshark · Go deep. OpenSSH Top 10 Password Crackers SecTools.Org: Top 125 Network Security Tools For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form . We're very impressed by the collective smarts of the security community and we highly recommend reading the whole list and investigating any tools you are unfamiliar with. 12 tools Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. version 1.1 on April 24, 2010 (2 years, 5 months ago). crackers wireless UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. version 4.9.43 on Dec. 3, 2011 (10 months ago). sniffers John the Ripper is a fast password cracker for UNIX/Linux and Mac OS X.. version 1.7.9-jumbo-6 on June 29, 2012 (3 months ago). version 7.3 on May 23, 2012 (4 months, 1 week ago). traffic-monitors fuzzers
Airsnarf - A rogue AP setup utility Firesheep - Wikipedia, the free encyclopedia - StumbleUpon The extension was created as a demonstration of the security risk of session hijacking vulnerabilities to users of web sites that only encrypt the login process and not the cookie(s) created during the login process. It has been warned that the use of the extension to capture login details without permission would violate wiretapping laws and/or computer security laws in some countries. Despite the security threat surrounding Firesheep, representatives for Mozilla Add-ons have stated that it would not use the browser's internal add-on blacklist to disable use of Firesheep, as the blacklist has only been used to disable spyware or add-ons which inadvertently create security vulnerabilities, as opposed to attack tools (which may legitimately be used to test the security of one's own systems). Note that even if they did, it wouldn't actually prevent anyone from using Firesheep, as Firefox contains a hidden setting to disable this blacklist. Countermeasures HTTPS
Short Film of the Day: Stuxnet: Anatomy of a Computer Virus | Film School... - StumbleUpon Why Watch? Because we should challenge how we define a film. Most of the shorts featured in this column are either easy to spot as stories or completely experimental. Even when a documentary short is in the spotlight, it tells a clear tale of people doing things. This short, is none of those things. Stuxnet: Anatomy of a Computer Virus is an informational film made entirely of voice over narration and motion graphics. It’s beautiful, compelling, and it does tell a story, but it’s nothing like most short films. What does it cost? Check out Stuxnet: Anatomy of a Computer Virus for yourself: Trust us.
Transferring your iTunes Library For most users, iTunes does a great job of handling all of the details of managing your media library for you, allowing you to manage your content through iTunes itself and not having to worry too much about the underlying files and folders that make up your iTunes library. Unfortunately, this user-friendly approach has one serious limitation: When it comes time to move your iTunes library, it can often be a bit of a challenge to figure out exactly what pieces you need to move and how to go about doing this. Many iTunes users start out with a basic iTunes library and use the default settings to store all of their media content on their primary internal hard drive. Another common scenario many users find themselves in is what to do when they upgrade to a new computer. How iTunes Manages Media Content The first and most important point is that iTunes is designed to handle all of the details of the underlying file system for you. iTunes: The Database versus the Content
Jailbreak basics: Everything you need to know for iPhone and iPad | TiPb We see quite a few questions in our Jailbreak Forums about jailbreak basics. So, we've decided to compile a master list of some basic jailbreak magic right here in one place. Hopefully this will help a lot of you beginner jailbreakers learn the ropes (and maybe even help some of you decide whether the leap to the jailbreak world has its advantages for you). Common ways to Jailbreak There are usually several ways to Jailbreak depending exactly when a new version of iOS is released, when a new exploit is found, and when new Jailbreaks are released. If you're not sure, here's how to find out which iOS software and iPhone modem firmware you're running. iOS 5.0 & 5.0.1 (GSM/CDMA) Jailbreak (untethered) iOS 5 & 5.0.1 (GSM/CDMA) Jailbreak (tethered) iOS 5 & 5.0.1 (GSM) Unlock How to unlock iOS 5 & 5.0.1 via ultrasn0w iOS 4.3.3 (AT&T/GSM) Jailbreak (untethered) iOS 4.2.6 (Verizon) Jailbreak (untethered) How to jailbreak iOS 4.2.6 on your Verizon iPhone 4 with Greenpois0n AppleTV Jailbreak Jailbreak Cydia
Tic tac toe... … three in a row! Apple released iOS 4.3.3 on Wednesday, and once again the untethered jailbreak exploit that @i0n1c created for 4.3.1 still works. That makes it an unprecedented three firmwares where the same userland exploit works. Today’s PwnageTool and redsn0w incorporate @i0n1c’s port to 4.3.3 (it’s ironic that such a long-lasting untether doesn’t even have an official name!). iPhone3GSiPhone4 (GSM) iPhone4 (CDMA) (4.2.8 - See update #3)iPod touch 3GiPod touch 4GiPad1AppleTV2G (v4.3 8F202…see update #2 below for the v4.3 8F305 bundle) Some things to note: ultrasn0w unlockers must stay away from redsn0w! As always, please feel free to ask for help or advice in our comment section, with our friendly moderators Confucious, sherif_hashim, dhlizard, Frank55, and subarurider (and many other very knowledgable commenters too!) Update #1: PwnageTool and redsn0w have been updated to include a fix for the iPhone3GS/i4 side switch vibration issue (only for 4.3.3!). Thanks once again, @i0n1c!
Cydia Search | Comprehensive Package Database Although packages are easily navigated from any jailbroken iOS device through the Cydia application itself, Cydia Search is a browser-based search engine offering a quick and reliable alternative for finding packages currently available in Cydia. Cydia Search checks all included repositories for new and updated packages once per hour. Additional information on how this system handles package data as well as asnwers to many frequently asked questions can be found on the FAQs page. Cydia is a full-featured graphical front end to APT and the dpkg package management system for the iOS developed by Jay Freeman (saurik). Cydia provides access to the latest software packages (including applications, themes, ringtones, and other modifications) exclusive to the jailbroken iPhone, iPod Touch, or iPad. Cydia is typically installed on iOS devices during the jailbreaking process and includes a handful of default repositories known as community sources. Default Repositories Other Repositories
Password crackers SecTools.Org: Top 125 Network Security Tools For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form . This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the Nmap Security Scanner , Ncat network connector , and Nping packet manipulator ). We're very impressed by the collective smarts of the security community and we highly recommend reading the whole list and investigating any tools you are unfamiliar with. 12 tools Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. version 1.1 on April 24, 2010 (2 years, 7 months ago). crackers wireless UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. version 4.9.43 on Dec. 3, 2011 (1 year ago). sniffers traffic-monitors
Kismet The GNU Netcat -- Official homepage Google hacking Basics The following search query will locate all websites that have the words "admbook" and "version" in the title of the website. It also checks to ensure that the web page being accessed is a PHP file. intitle:admbook intitle:version filetype:php One can even retrieve the username and password list from Microsoft FrontPage servers by inputting the given microscript in Google search field: "#-Frontpage-" inurl:administrators.pwd Devices connected to the Internet can be found. Another useful search is following intitle:index.of followed by whatever you want to search. Advanced operators There are many similar advanced operators which can be use to exploit insecure websites: See also Johnny Long#Google hacking External links