Items Tagged with "Hacking"


69dafe8b58066478aea48f3d0f384820

Penetration Testers: Backtrack 5 Release Slated for May

May 04, 2011 Added by:Headlines

BackTrack 5 will be based on Ubuntu Lucid (10.04 LTS), will support 32 and 64 bit architectures, and will officially support KDE 4, Gnome and Fluxbox while providing users streamlined ISO downloads of each Desktop Environment...

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SMBRelay Attacks on Corporate Users Part 2

April 27, 2011 Added by:Alexander Polyakov

MS Office programs will show an alert to our victim if it couldn't download content from a remote resource. We could put a document on our shared resource and when MS Office opens the doc, it takes a style sheet from our shared resource and doesn't show an alert to the victim...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

New Update: The Social-Engineer Toolkit v1.3.5

April 25, 2011 Added by:Headlines

The Social Engineering Toolkit is a python-driven suite of custom tools which focuses on attacking the human element in penetration testing. It’s purpose is to augment and simulate social-engineering attacks and allows for effectively testing how a targeted attack may succeed...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

The Art of Cyber Warfare: Counterattack Fail

April 18, 2011 Added by:J. Oquendo

The sole purpose of Ensatus is deception and it drives the point of "fail" when it comes to counterattacking. If I were performing a sanctioned penetration test, I would be using decoys. In the event counterattacking were legal, you would be counterattacking an innocent victim...

Comments  (2)

7d55c20d433dd60022642d3ab77b8efb

SMBRelay Attacks on Corporate Users

April 07, 2011 Added by:Alexander Polyakov

An attack on a network is a progressive action. We escalate our rights step-by-step to a domain administrator. Even casual un-privileged users can give us access to some shared resources. But how do we get these user rights? We can enforce users to authenticate on controlled a machine...

Comments  (0)

E973b16363b3de77b360563237df7e32

Defeating Protections on Popular Gaming Consoles

March 30, 2011 Added by:Bozidar Spirovski

Manufacturers lock their consoles through a firmware protection mechanism that allows only signed code to run, and a lot of people attempt to bypass these protections to run custom code. Bypassing is illegal, but we are going to discuss some methods for different consoles...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Mobile Phones are Being Hacked and Cloned

March 24, 2011 Added by:Robert Siciliano

Cloning occurs when hackers scan the airwaves to obtain SIM card information, electronic serial numbers and mobile identification numbers, and then using that data on other phones. The bad guy simply uses an interceptor, hardware, and software to make a phone exactly like yours...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Indictment Issued in Stock Manipulation Botnet Operation

March 23, 2011 Added by:Headlines

The indictment asserts that "Rad acted as a middleman between stock promoters seeking to pump shares of stock, and computer experts located inside and outside of the United States who used various means, including spam email campaigns, botnets, and hacking to pump the stock..."

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

Metasploit VNC Password Extraction

March 22, 2011 Added by:Rob Fuller

I ran into the 'getvncpw' meterpreter script issue on pentests in the past but didn't know much about the whacked out version of DES that RFB (the VNC protocol) was using. Not being a fan of manually editing a binary and compiling each time, I had a password to crack I wanted to find another way...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Was a Teenage Girl Central to the HBGary Hack?

March 16, 2011 Added by:Headlines

"Kayla played a crucial role, posing as Barr to an IT administrator... to gain access to the company’s servers... [Kayla] and four other hackers broke into his company’s servers... defacing his Web site, purging data and posting more than 50,000 of his emails online for the world to see..."

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Social Engineering: The Art of Human Hacking

March 16, 2011 Added by:Ben Rothke

Far too many people think that information security and data protection is simply about running tools, and too many technology books focus on the hardware and software elements, completely ignoring the human element. The social engineer can then use that gap to their advantage...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chinese Officials Deny Role in Attacks on South Korea

March 10, 2011 Added by:Headlines

"You can never judge the origin of attackers from the computer's IP address. A professional hacker can launch cyber attacks from everywhere and disguise himself to be any country's citizens," an anonymous Chinese hacker told the Global Times...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

HBGary Federal Emails Reveal More Unreported Attacks

March 09, 2011 Added by:Headlines

Emails leaked in the HBGary Federal network breach reveal a spate of high level attacks targeting leading companies across multiple industries. The foreign-based attacks appear to be industrial espionage efforts intended to harvest sensitive trade secrets and intellectual property...

Comments  (1)

D8853ae281be8cfdfa18ab73608e8c3f

Cachedump for Meterpreter in Action

March 02, 2011 Added by:Rob Fuller

Cachedump for Meterpreter in Action: Pull it down; Load up the console and pwn something; MAKE SURE YOU ARE SYSTEM; Crack it; Use it; Woot...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Network Security Monitoring vs Backtrack Autopwn

February 25, 2011 Added by:Dan Dieterle

For this part of the series I will be using three machines – a target machine, an attacker system and a third computer running the Network Security Monitoring (NSM) Security Onion Live CD. The NSM machine will be connected to the target machine via a mirrored port...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Cyber Weapon Capable of Crashing the Internet?

February 23, 2011 Added by:Dan Dieterle

In normal operation, the BGP protocol helps keep the internet up and running. If a router goes down, Routers update the missing link and go around it. But if these routers are attacked on purpose and flooded with updates, it could put the internet into a state where it could not recover...

Comments  (2)

Page « < 8 - 9 - 10 - 11 - 12 > »