background preloader


Featured Article Categories: Featured Articles | Hacks In other languages: Español: hackear, Português: Hackear, Italiano: Hackerare, Français: hacker un système informatique, Русский: стать хакером, Deutsch: Einen Computer "hacken", 中文: 成为黑客, Bahasa Indonesia: Meretas, Čeština: Jak hackovat, Nederlands: Leren hacken Related:  Hacking/CrackingWeb Pages

Software cracking Software cracking is the modification of software to remove or disable features which are considered undesirable by the person cracking the software, usually related to protection methods: (copy protection, protection against the manipulation of software), trial/demo version, serial number, hardware key, date checks, CD check or software annoyances like nag screens and adware. The distribution and use of cracked copies is illegal in most countries.[citation needed] There have been lawsuits over cracking software.[1] A computer program that performing software cracking is called crack, or is euphemistically referred to as a patch. History[edit] The first software copy protection was applied to software for Apple II, Atari 800 and Commodore 64 computers. One of the primary routes to hacking these early copy protections was to run a program that simulates the normal CPU operation. On Atari 8-bit computers, the most common protection method was via "bad sectors". Methods[edit] Effects[edit]

Computer Hacking 101 - Real Simple Hacking, the computer world’s version of breaking and entering, has been around as long as the Internet itself. And the criminals have gotten bolder than ever. Last summer alone, online assailants broke into the computers of Citigroup, Sony Online Entertainment, and gaming company Bethesda Softworks, gaining access to information pertaining to nearly 25 million customers. Probably not, experts say. “In some cases, these cyber criminals just want to prove that they can break into the computer systems,” says Chuck Davis, a professor of ethical hacking and computer forensics at Harrisburg University of Science and Technology, in Harrisburg, Pennsylvania. Nevertheless, you can take a few steps to be safer should an attack strike a company that you do business with.

Free hacks for everyone No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing (9781597492157): Johnny Long, Jack Wiles, Scott Pinzon, Kevin D. Mitnick Hacking Tutorials 101 Hacking is a broad term that typically refers to anyone that has a strong understanding of computers and networking. In the media, hackers are portrayed as evil computer thieves looking to steal information from innocent victims. In reality, those types of people are known as crackers. That doesn’t mean the information you learn while becoming a hacker can’t be used for illegal purposes; the difference is that real hackers have no interest in illicit activities. With that disclaimer out of the way, let’s look at what it takes to actually become a hacker. Programming If your computer experience is rather limited, the first thing you need to learn is computer programming. Most computer programming languages include Interactive Development Environments (IDEs) that make programming much easier. What programming language should you pick? Python is a high-level programming language that is effective as a standalone application platform and also works very well for web development.

Null Byte - The aspiring grey hat hacker / security awareness playground « Wonder How To Hacking Techniques in Wireless Networks Prabhaker Mateti Department of Computer Science and EngineeringWright State UniversityDayton, Ohio 45435-0001 This article is scheduled to appear in “The Handbook of Information Security”, Hossein Bidgoli (Editor-in-Chief), John Wiley & Sons, Inc., 2005. 1. Introduction. 2 2. 2.1 Stations and Access Points. 3 2.2 Channels. 4 2.4 Infrastructure and Ad Hoc Modes. 4 2.5 Frames. 4 2.6 Authentication. 5 2.7 Association. 6 3. 3.1 Passive Scanning. 7 3.2 Detection of SSID.. 8 3.3 Collecting the MAC Addresses. 8 3.4 Collecting the Frames for Cracking WEP. 8 3.5 Detection of the Sniffers. 9 4. 4.1 MAC Address Spoofing. 10 4.2 IP spoofing. 10 4.3 Frame Spoofing. 11 5. 5.1 Detection of SSID.. 12 5.2 Detection of APs and stations. 12 5.3 Detection of Probing. 12 6. 6.1 Configuration. 12 6.2 Defeating MAC Filtering. 13 6.3 Rogue AP. 13 6.4 Trojan AP. 13 6.5 Equipment Flaws. 13 7. 7.1 Jamming the Air Waves. 14 7.2 Flooding with Associations. 14 7.3 Forged Dissociation. 14 7.4 Forged Deauthentication. 15 7.5 Power Saving. 15 8.

Spying Campaign Bearing NSA's Hallmark Found Infecting Thousands of Computers - Bloomberg Business (Bloomberg) -- A sophisticated spying campaign infected tens of thousands of computers worldwide with surveillance software embedded in hard drives, according to a report from a cybersecurity company that points toward the U.S. National Security Agency. The malware was found in 30 countries -- including Iran, Russia, China, Afghanistan and Pakistan -- and targeted governments and diplomatic institutions, military, Islamic activists and key industries such as telecommunications, aerospace, energy, financial institutions and oil and gas, Kaspersky Lab Inc., a Moscow-based cybersecurity company, said in a report released over the weekend. The group’s ability to infect hard-drive firmware “exceeds anything we have ever seen before,” the company said. Kaspersky named the perpetrators the Equation Group. NSA spokeswoman Vanee Vines declined to comment on the report or discuss any details about spying programs. Snowden Leak Seagate Encryption Tailored Access

Top 15 Security/Hacking Tools & Utilities 1. Nmap I think everyone has heard of this one, recently evolved into the 4.x series. Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. Can be used by beginners (-sT) or by pros alike (–packet_trace). Get Nmap Here 2. Recently went closed source, but is still essentially free. Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Get Nessus Here 3. Yes, JTR 1.7 was recently released! John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. You can get JTR Here 4. Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Get Nikto Here 5. Get SuperScan Here 6. p0f 7. 8.

How the NSA Plans to Infect 'Millions' of Computers with Malware Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. : Home of SABnzbd+, the Full-Auto Newsreader An Inside Look at Anonymous, the Radical Hacking Collective - The New Yorker In the mid-nineteen-seventies, when Christopher Doyon was a child in rural Maine, he spent hours chatting with strangers on CB radio. His handle was Big Red, for his hair. Transmitters lined the walls of his bedroom, and he persuaded his father to attach two directional antennas to the roof of their house. CB radio was associated primarily with truck drivers, but Doyon and others used it to form the sort of virtual community that later appeared on the Internet, with self-selected nicknames, inside jokes, and an earnest desire to effect change. Doyon’s mother died when he was a child, and he and his younger sister were reared by their father, who they both say was physically abusive. Small and wiry, with a thick New England accent, Doyon was fascinated by “Star Trek” and Isaac Asimov novels. At the age of fourteen, he ran away from home, and two years later he moved to Cambridge, Massachusetts, a hub of the emerging computer counterculture. Doyon was incensed. “Tunisia,” Brown said.