Archive | General Hacking


01 March 2006 | 17,201 views

Should Social Engineering be a part of Penetration Testing?

This is actually a very interesting debate. Just to introduce if you don’t know.. What is Penetration Testing A penetration test is a method of evaluating the security of a computer system or network by simulating an attack by a malicious cracker. The process involves an active analysis of the system for any weaknesses, technical [...]

Continue Reading


27 February 2006 | 409,542 views

Password Cracking with Rainbowcrack and Rainbow Tables

What is RainbowCrack & Rainbow Tables? RainbowCrack is a general propose implementation of Philippe Oechslin’s faster time-memory trade-off technique. In 1980 Martin Hellman described a cryptanalytic time-memory trade-off which reduces the time of cryptanalysis by using precalculated data stored in memory. This technique was improved by Rivest before 1982 with the introduction of distinguished points [...]

Continue Reading


24 February 2006 | 22,645 views

mIRC Backdoor

Well it’s not really a backdoor… but we can consider it one… Some time ago it apeared on many websites (including mine) an article about a backdoor in mIRC… all this backdoor stuff was really nothing more than a mIRC script that by it’s mean made the client to respond at any command received via [...]

Continue Reading


24 February 2006 | 6,520 views

Passwords Passe at RSA

SAN JOSE, California — Identity theft and online bank fraud were the unofficial themes of the 2006 RSA Conference, a massive security confab where Bill Gates came to announce the imminent death of the password and vendors filled the exhibition halls with iPod giveaways and promises that their product could stop everything from spam and [...]

Continue Reading


23 February 2006 | 8,229 views

Google Desktop 3 Enterprise

Google Enterprise has reacted to privacy concerns and released Google Desktop 3 Enterprise. It responds to security concerns allowing full administrator control, letting them use the standard group policy settings to completely disable features, including the controversial Search Across Computers feature which you can read about in our original article. Google Enterprise’s Article

Continue Reading


23 February 2006 | 9,978 views

The new Macbook Pro 15″ 2.0Ghz taken apart

OWC (Other World Computing) is a great site for buying parts for the mac. Their prices are quite cheap if you compare prices with stores in asia. Two days back (21/2/06) they got their hands on a Macbook Pro, which they received at 10:30pm and managed to take it all apart by 1.30pm. Pictures are [...]

Continue Reading


19 February 2006 | 7,705 views

Spanish ‘Super’ Hacker Jailed for 2 Years over DoS attack

A Spanish hacker who launched a denial of service attack that hobbled the net connections of an estimated three million users has been jailed for two years and fined 1.4m. Santiago Garrido, 26, (AKA Ronnie and Mike25) launched the attack using a computer worm in retaliation for been banned from the popular “Hispano” IRC chat [...]

Continue Reading


17 February 2006 | 76,735 views

BackTrack – A merger between WHAX and Auditor

BackTrack is the result of the merging of two Innovative Penetration Testing live Linux distributions namely Whax and Auditor. Combining the best features from both distributions, and paying special attention to small details, this is probably the best version of either distributions to ever come out. Based on SLAX (Slackware), BackTrack provides user modularity. This [...]

Continue Reading