Archive | General Hacking


08 April 2006 | 8,145 views

CIA Employees Identified Online

Pretty Scary eh? Although some people do call them the Central Lack-of Intelligence Agency. Privacy is a major issue and well people should be a little more careful about what they reveal online, perhaps I’ll rehash my old Google Hacking Presentation and write it up as a post for Darknet. I guess it would be […]

Continue Reading

25 March 2006 | 156,176 views

Download videos?

Ever wanted to download those cool videos from (Its an online video storage site similar to for storing images) and can’t because those peeps made it difficult for you to just download them offline? Well now you can !! Go to and follow the instructions on how to copy the video […]

Continue Reading

25 March 2006 | 6,709 views

Spammer gets 8 years in Jail for Identity theft

Good I say, nothing worse than a spammer. A bulk e-mailer who looted more than a billion records with personal information from a data warehouse has been sentenced to eight years in prison, federal prosecutors said Wednesday. Scott Levine, 46, was sentenced by a federal judge in Little Rock, Ark., after being found guilty of […]

Continue Reading

24 March 2006 | 7,147 views

Is Open Source Really More Secure?

Is Open Source more secure? That’s a question that can be answered with both yes and no. Not only that, but the reasons for the “yes” and the “no” are fairly much the same. Because you can see the source the task of hacking or exploiting it is made easier, but at the same time […]

Continue Reading

16 March 2006 | 77,855 views

Elevator/Lift Hacking !!!!!

This is old news to those who already knows about it (Found out about it last year and tested it till now). But i just had to try it before actually posting it up. Do you get tired of being in an elevator and someone else gets on every other floor in between the floors […]

Continue Reading

14 March 2006 | 1,154,981 views

10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery)

1. BackTrack The newest contender on the block of course is BackTrack, which we have spoken about previously. An innovative merge between WHax and Auditor (WHax formely WHoppix). BackTrack is the result of the merging of two Innovative Penetration Testing live Linux distributions Whax and Auditor, combining the best features from both distributions, and paying […]

Continue Reading

02 March 2006 | 12,254 views

Norton Antivirus Funny Bug

the following exploits (if we can call it this way) was published on securityfocus bugtraq mailinglist… it is entirely reproduced in the following lines: Norton Internet monitoring tools issues Versions Affected : * Fix : No What im writing about is how to stop the internet of some user that is using the norton tools […]

Continue Reading

01 March 2006 | 17,476 views

Should Social Engineering be a part of Penetration Testing?

This is actually a very interesting debate. Just to introduce if you don’t know.. What is Penetration Testing A penetration test is a method of evaluating the security of a computer system or network by simulating an attack by a malicious cracker. The process involves an active analysis of the system for any weaknesses, technical […]

Continue Reading

27 February 2006 | 425,616 views

Password Cracking with Rainbowcrack and Rainbow Tables

What is RainbowCrack & Rainbow Tables? RainbowCrack is a general propose implementation of Philippe Oechslin’s faster time-memory trade-off technique. In 1980 Martin Hellman described a cryptanalytic time-memory trade-off which reduces the time of cryptanalysis by using precalculated data stored in memory. This technique was improved by Rivest before 1982 with the introduction of distinguished points […]

Continue Reading

24 February 2006 | 23,000 views

mIRC Backdoor

Well it’s not really a backdoor… but we can consider it one… Some time ago it apeared on many websites (including mine) an article about a backdoor in mIRC… all this backdoor stuff was really nothing more than a mIRC script that by it’s mean made the client to respond at any command received via […]

Continue Reading