background preloader

Hacker Test: A site to test and learn about web hacking

Hacker Test: A site to test and learn about web hacking
Related:  Cool Hacks

Challenges - News from India on Technology, Electronics, Computers, Open Source & more: EFYTIMES.COM Hacking tools can be dangerous in the wrong hands. But, they can be just as useful for a good ethical hacker too! Monday, February 03, 2014: Hacking tools have been said to make hacking quite easy as compared to the old days. But, there is still more to being a hacker than just that. Wireless Hacking: These are tools that help you hack into wireless networks. 1. 2. 3. inSSIDer 4. Intrusion Detection Systems: Intrusion detection tools are one of the most important part of any security arrangement. 1. 2. Port Scanners 1. 2. 3. Encryption Tools: In an age where more and more governments are being found spying on their own citizens, encryption is the word of the day. 1. 2. 3. 4. 5. 6. 7. 8. Password Crackers: The name is pretty self explanatory in this case. 1. 2. 3. 4. 5. 6. 7. fgdump 8. 9. 10. 11. Packet Crafting: Packet crafting is the technique through which an attacker finds vulnerabilities or entry points within your firewall. 1. 2. 3. 4. 5. 6. 1. 2. 3. 4. 1. 2. 3. 4. dsniff 5. 1. 4. 5.

How to boost your WiFi signal with a beer can Here you will find very original tips to boost wireless signal to your computer. Good luck and have a fun. Source Top 15 Open Source/Free Security/Hacking Tools | PenTesting | Hacking | Coding 1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. 2. Wireshark is a network protocol analyzer. 3. Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners. 4. Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. 5. John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. 6. ettercap Ettercap is a comprehensive suite for man in the middle attacks. 7. The Nexpose Community Edition is a free, single-user vulnerability management solution. 8. 9. 10. w3af w3af is a Web Application Attack and Audit Framework. 11. hping 13.

Top 50 Hacking Tools That You Must Have Whether you are a Penetration tester, a hacker or an aspiring newbie trying to learn Cyber Security, you must have a nice catalogue of tools to make your life easier. While these tools do make working simpler but cannot compensate for the vast amount of knowledge required in this field. Ethical hacking and online security involves a lot efforts. Many tools are used to test and keep software secure. The same tools can also be used by hackers for exploitation. A hacking tool is a computer program or software which helps a hacker to hack a computer system or a computer program. In this post i’m going to mention 50 different tools under 9 categories that your ‘Hack Lab’ must have. Intrusion Detection Systems :- These are the tools you must have if you’re building a hack lab for penetration testing or for any security arrangement. SnortNetCop Encryption Tools :- While the above tools do identify any suspicious activity but they can’t protect your data, you need encryption tools for that.

Reverse Engineering Serial Ports Given the name of this blog and the number of requests that I’ve had, I think it’s high time we discussed serial ports; specifically, serial ports in embedded systems. My goal here is to describe the techniques that I’ve found effective in identifying and reverse engineering embedded serial ports through the use of definitive testing and educated guesses, and without the need for expensive equipment. Serial ports are extremely useful to embedded developers, who commonly use them for: Accessing the boot loaderObserving boot and debug messagesInteracting with the system via a shell Needless to say, this functionality is also useful to hackers, so finding a serial port on an embedded device can be very advantageous. Westell 9100EM PCB Now, these aren’t your dad’s RS-232 serial ports that we’re looking for; these are Universal Asynchronous Receiver Transmitters (UARTs), commonly found in embedded devices. Let’s start with the hardware interface first. VccGroundTransmitReceive P1402 top P1404 top

Bus Pirate From DP Bus Pirate v3.6 available now for $30.15, including worldwide shipping Bus Pirate v3.6 is also available at Adafruit Industries (USA) EpicTinker (USA) Watterott Electronic (Germany) Evola (Europe) Anibit (USA) Hackaday (USA) The Bus Pirate is an open source hacker multi-tool that talks to electronic stuff. It's got a bunch of features an intrepid hacker might need to prototype their next project. This manual is an effort to link all available Bus Pirate information in one place. Read about the Bus Pirate v3 design; the v3b update; and the v3.5 update. An initial batch of Bus Pirate v4 is now available to early adopters and testers. Introduction Features Features overview (original) Hardware Tutorials Forums Bus Pirate forums Linux, OS X Download Although the primary target of community is to significantly improve the user experience for Bus Pirate v4, the Bus Pirate v3 support will be maintained at all costs (despite the difficulties while compiling with the recent MPLAB XC16 compilers) Mods

The Common Methods of Hardware Hacking Hardware Hacking is an art, but there are some common methods to modifying devices that can jump-start any good hacking project. Favorited Favorite 2 The word “hacking” as it pertains to hardware is often misused. In the commonly accepted definition, “hardware hacking” means modifying a piece of existing electronics to use it in a way that it was not necessarily intended. Even that definition is vague, as it can refer to any method of modifying hardware, be it the enclosure, the electronics, or the behavior. If you’re looking to hack a piece of hardware, how you approach the hack depends on what you’re trying to do. Method 1: Patching Into I/O The first (and arguably easiest) method of hacking a device is patching into its control mechanism. With access to button pads, you can attach your own button, relay, or transistor circuit to control it with your own hardware. Image courtesy of Hackaday With access to the LED pads on a device, you have a reliable output source from the device.

Public Lab: ramanPi - The 3D Printable Raspberry Pi Raman Spectrometer ****If you have Python, pyQt4, matplotlib, signal processing, optics, raman spectroscopy or FPGA experience contact dev @ ramapi .org! Or go to dev . ramanPi . org and sign up to the developer forums! What I want to do: Build a Raman Spectrometer based on a Raspberry Pi, make it 3D Printable and customizable.. An open source 3D Printable Raman Spectrometer that uses a raspberryPi, a couple of arduino compatible ARM boards, a really bright laser and some parts you can grab from eBay, adafruit, sparkFun, Mouser, or wherever...! BASIC DESIGN GOALS: 1. My attempt and results For the most current information, please visit I keep pretty detailed logs of my progress on that site.. Questions and next steps Finish it and go to space! Why I'm interested Because Science!!! Here's the new 'Semifinalist' video... There are some pictures below.. just a couple.. did a bio on me!! And a quick youtube video overview... The entire unit..

Firesheep - codebutler When logging into a website you usually start by submitting your username and password. The server then checks to see if an account matching this information exists and if so, replies back to you with a "cookie" which is used by your browser for all subsequent requests. It's extremely common for websites to protect your password by encrypting the initial login, but surprisingly uncommon for websites to encrypt everything else. This leaves the cookie (and the user) vulnerable. HTTP session hijacking (sometimes called "sidejacking") is when an attacker gets a hold of a user's cookie, allowing them to do anything the user can do on a particular website. This is a widely known problem that has been talked about to death, yet very popular websites continue to fail at protecting their users. Today at Toorcon 12 I announced the release of Firesheep, a Firefox extension designed to demonstrate just how serious this problem is. After installing the extension you'll see a new sidebar. That's it.