background preloader

Free online hacking game - Slave hack, hack computers, banks and servers.

Free online hacking game - Slave hack, hack computers, banks and servers.
Related:  slave hack gameHacker Sites / Blogs / Forums

hackergames.net Forums Unfortunately the last software manual was inexplicably removed so I've opted to recreate (or hopefully improve) it. In this manual, I'll list each of the software types and give some situations in which they may be useful (or some tricks to getting around those uses that others may put them to Offensive software These pieces of software are used to attack others and gain control of their system. Be careful though as doing so might reveal your IP and leave you open to attack. Waterwalls (.wwl ver 0.5 to 5.7) This is one half of the most important pieces of software in the game. Password Crackers (.crc ver 0.3 to 5.2) This is the other half of the most important software in the game. DDoS Remote (.rddos ver 0.3 to 1.0) This is used to control your "botnet". Defensive Software These pieces of software are used to prevent attacks or remove viruses left by them Firewalls (.fwl ver 0.5 to 5.7) This is a very handy piece of software. Anti-virus (.av ver 0.3 to 4.9) Viruses Uninstalled virus -

HackQuest HellBound Hackers Games High Resolution Desktop Wallpapers | Page 1 WallpapersWide.com Your display featuresAspect Ratio: StandardResolution: 1600 x 1200 Categories Filter by or Resolutions Wide Standard Mobile Ratio Mobile Brands Dual Other Home > Games Wallpapers > Page 1 Category Games « Previous1234...789Next » How to Crack a Wi-Fi Network. | Arrow Webzine 1.Back Track Today we’re going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on. Dozens of tutorials on how to crack WEP are already all over the internet using this method. Seriously—Google it. This ain’t what you’d call “news.” Unless you’re a computer security and networking ninja, chances are you don’t have all the tools on hand to get this job done. * A compatible wireless adapter—This is the biggest requirement. * A BackTrack 3 Live CD. * A nearby WEP-enabled Wi-Fi network. * Patience with the command line. To crack WEP, you’ll need to launch Konsole, BackTrack’s built-in command line. First run the following to get a list of your network interfaces: The only one I’ve got there is labeled ra0. Now, run the following four commands. {*style:<i>airmon-ng stop (interface) ifconfig (interface) down macchanger –mac 00:11:22:33:44:55 (interface) airmon-ng start (interface) </i>*} Now it’s time to pick your network. You’re almost there. </b>*} And much more! 3.

Riddle Trail Tutorial: Firewalls 0.1 - 1.0 - SlaveHack Wiki This are all riddles from firewalls 0.1 to 1.0. NOTE: Please don't use this guide, solving the puzzles yourselve is alot more fun! Only use it if you REALLY, really can't find a riddle. Thanks! 1.1.1.1 - Important.txt I was told not to add these to the 1.1.1.1 dns server? I got this hot vddos virus today, make sure you hide it because this software is illegal.I installed the remote DDoS controler on another system:237.139.121.181 ('riddled')One number has been replaced for a 1, this number should have been 8. 237.139.128.181 56.195.92.143 - MOTD.txt Message Of The Day#################-Reading this 5 seconds passedDear collegues,Enjoy our latest software we got a fine cracker, a new.vshare virus and FTP cash, sowe're about to make some good money.I did not yet dare to attempt our new WWL on theYpesteiner bank, but we should organiseit soon ? BTW, when i made a type i surfed to 57.195.92.143,I noticed this computer has an activeFTP server, we might want to check for software.

Hacking Conference Vote Now! Top Ten Web Hacking Techniques of 2011 Every year the Web security community produces a stunning amount of new hacking techniques published in various white papers, blog posts, magazine articles, mailing list emails, etc. Within the thousands of pages are the latest ways to attack websites, Web browsers, Web proxies, and so on. Beyond individual vulnerability instances with CVE numbers or system compromises, we’re talking about actual new and creative methods of Web-based attack. The Top Ten Web Hacking Techniques list encourages information sharing, provides a centralized knowledge-base, and recognizes researchers who contribute excellent work. How the winners were selected… Phase 1: Open community voting (Ballot) [COMPLETE] From of the field of 51 total entries received listed below, each voter (open to everyone) ranks their fifteen favorite Web Hacking Techniques using a survey. (they’ll be deleted) Voting will close at the end of the day this Monday, February 20. [CLOSED] The more people who vote, the better the results!

Minecraft Wiki How to use Google for Hacking. | Arrow Webzine Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. 1. There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. you now have access to the Live cameras which work in real-time. intitle:”Live View / – AXIS” Click on any of the search results to access a different set of live cameras. 2. filetype:xls inurl:”email.xls” 3. “? 4.

Related:  I.T.Challenges / WargamesgamegamesGamesabedonlyEthical Hackingrakeilen