reaver-wps - Brute force attack against Wifi Protected Setup Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations. On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase.
Software >> sslstrip This tool provides a demonstration of the HTTPS stripping attacks that I presented at Black Hat DC 2009. It will transparently hijack HTTP traffic on a network, watch for HTTPS links and redirects, then map those links into either look-alike HTTP links or homograph-similar HTTPS links. It also supports modes for supplying a favicon which looks like a lock icon, selective logging, and session denial. Vertical Fixed Navigation 2 in CSS and jQuery A smart vertical navigation, with round indicators that turn into labelled icons when the user interacts with them. Browser support ie Chrome Firefox Safari Opera 9+ Our first concept of vertical fixed navigation is one of our most popular resources. This time, we tried to push this concept a little further.
Software >> sslsniff Some History This tool was originally written to demonstrate and exploit IE's vulnerabilityto a specific "basicConstraints" man-in-the-middle attack. While Microsoft has since fixed the vulnerability that allowed leaf certificates to act as signing certificates, this tool is still occasionally useful for other purposes. It is designed to MITM all SSL connections on a LAN, and dynamically generates certs for the domains that are being accessed on the fly. The new certificates are constructed in a certificate chain that is signed by any certificate that you provide.
Summary - [b] Guitar-Online - StatCounter pageviews uniquevisits returningvisits 73 38 2 63 29 1 44 36 0 65 45 2 91 53 4 47 40 2 55 38 5 81 52 3 72 39 1 62 36 3 79 60 3 52 46 3 104 47 3 59 35 3 81 57 0 54 29 0 71 40 2 59 33 1 65 44 0 85 41 0 73 44 3 66 39 1 39 30 0 48 33 1 69 32 1 65 47 0 49 42 2 Returning Visits - Based purely on a cookie, if this person is returning to your website for another visit an hour or more later First Time Visits - Based purely on a cookie, if this person has no cookie then this is considered their first time at your website. Unique Visits - Based purely on a cookie, this is the total of the returning visits and first time visits - a total count of visits. GNU httptunnel httptunnel creates a bidirectional virtual data connection tunnelled in HTTP requests. The HTTP requests can be sent via an HTTP proxy if so desired. This can be useful for users behind restrictive firewalls. If WWW access is allowed through a HTTP proxy, it's possible to use httptunnel and, say, telnet or PPP to connect to a computer outside the firewall. httptunnel is written and maintained by Lars Brinkhoff. See the file AUTHORS in the tarball for more information about contributors to this package.
9 great color resources Colour is an integral element of design. And the web is full of endless resources and tutorials covering it. But, sometimes too much choice can be confusing. So we've picked this selection of the best resources that will really help you to get to grips with the subject.