background preloader

Hacking

Facebook Twitter

CODING FOR GOOD. Real World Programming Problems and Competitions. Hacking, Security Papers. - StumbleUpon. The Official ROOTCON Blog: 3 Common Automated Tools with GUI Used for Wireless Cracking / Pentesting. 1. wifite wifite is a mass WEP/WPA WiFi Cracker that is coded in python which makes cracking WIFI passwords and security easier, it uses the aircrack-ng suite.

It can be executed by using the command line python wifite.py or . /wifite.py. To see a list of command lines with detailed information for the script, you can just type in the terminal . /wifite.py –help or python wifite.py –help. 2. Fern Wifi Cracker is another GUI for easier wireless penetration testing which uses the aircrack-ng suite of tools. 3. Gerix Wifi Cracker a simple graphical user interface just like wifite and Fern Wifi Cracker. About the Contributor: Shipcode is a prolific blogger of ROOTCON and at the same time an InfoSec enthusiast from Cebu. ROOTCON is managed by like minded InfoSec professionals across the Philippines.

How To Become A Hacker. Copyright © 2001 Eric S.

How To Become A Hacker

Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker? ". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is.

Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own. If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. Numerous translations of this document are available: ArabicBelorussianBulgarianChinese, Czech. The five-dots-in-nine-squares diagram that decorates this document is called a glider. If you want to be a hacker, keep reading. Google Hacking Database, GHDB, Google Dorks. Hacking wifi. Default Router Passwords - The internets most comprehensive router password database. Soda Machine Hack. Most modern vending machines have little computers inside.

Soda Machine Hack

A tiny screen usually displays some information. Although relatively little known, pressing a certain combinations of buttons can control the settings. For instance, you can check the internal temperature, view the amount of money inside, empty change, or dump certain beverages. It will generally only work on new machines which is pictured on the right side. Press the buttons [4] [2] [3] [1] one after another. Once inside the buttons become controls for navigating the menu system. Button [1] – Back/ExitButton [2] – DownButton [3] – UpButton [4] – Select You should now be able to scroll through the available settings. Here are the descriptions of some of the settings you may run into: Pressing the coin return or back button also exits out of the setting menus. Although access to those settings is usually enabled, it is sometimes locked down by the owner or maintenance. CPO – Coin payment mode dumps coins out of the machine. Passive Aggressive Passwords.

How To Crack A Wi-Fi Network's WPA Password With Reaver. Your Wi-Fi network is your convenient wireless gateway to the internet, and since you’re not keen on sharing your connection with any old hooligan who happens to be walking past your home, you secure your network with a password, right?

How To Crack A Wi-Fi Network's WPA Password With Reaver

Knowing, as you might, how easy it is to crack a WEP password, you probably secure your network using the more bulletproof WPA security protocol. Here’s the bad news: A new, free, open-source tool called Reaver exploits a security hole in wireless routers and can crack most routers’ current passwords with relative ease. Here’s how to crack a WPA or WPA2 password, step by step, with Reaver — and how to protect your network against Reaver attacks. In the first section of this post, I’ll walk through the steps required to crack a WPA password using Reaver. After that, I’ll explain how Reaver works, and what you can do to protect your network against Reaver attacks.

Please enable JavaScript to watch this video. What You’ll Need The BackTrack 5 Live DVD. Iwconfig.