Archive | General Hacking




Should Social Engineering be a part of Penetration Testing?

This is actually a very interesting debate. Just to introduce if you don’t know.. What is Penetration Testing A penetration test is a method of evaluating the security of a computer system or network by simulating an attack by a malicious cracker. The process involves an active analysis of the system for any weaknesses, technical […]

Tags: , , , , , , ,

Posted in: General Hacking | Add a Comment

Password Cracking with Rainbowcrack and Rainbow Tables

What is RainbowCrack & Rainbow Tables? RainbowCrack is a general propose implementation of Philippe Oechslin’s faster time-memory trade-off technique. In 1980 Martin Hellman described a cryptanalytic time-memory trade-off which reduces the time of cryptanalysis by using precalculated data stored in memory. This technique was improved by Rivest before 1982 with the introduction of distinguished points […]

Tags: , , , , , , , , , ,

Posted in: General Hacking, Hacking Tools, Password Cracking | Add a Comment

mIRC Backdoor

Well it’s not really a backdoor… but we can consider it one… Some time ago it apeared on many websites (including mine) an article about a backdoor in mIRC… all this backdoor stuff was really nothing more than a mIRC script that by it’s mean made the client to respond at any command received via […]

Tags: , , , , ,

Posted in: General Hacking | Add a Comment

Passwords Passe at RSA

SAN JOSE, California — Identity theft and online bank fraud were the unofficial themes of the 2006 RSA Conference, a massive security confab where Bill Gates came to announce the imminent death of the password and vendors filled the exhibition halls with iPod giveaways and promises that their product could stop everything from spam and […]

Tags: , ,

Posted in: General Hacking | Add a Comment

Google Desktop 3 Enterprise

Google Enterprise has reacted to privacy concerns and released Google Desktop 3 Enterprise. It responds to security concerns allowing full administrator control, letting them use the standard group policy settings to completely disable features, including the controversial Search Across Computers feature which you can read about in our original article. Google Enterprise’s Article

Tags: , , ,

Posted in: General Hacking, Privacy | Add a Comment

The new Macbook Pro 15″ 2.0Ghz taken apart

OWC (Other World Computing) is a great site for buying parts for the mac. Their prices are quite cheap if you compare prices with stores in asia. Two days back (21/2/06) they got their hands on a Macbook Pro, which they received at 10:30pm and managed to take it all apart by 1.30pm. Pictures are […]

Tags: , , , ,

Posted in: Apple, General Hacking, General News | Add a Comment

Spanish ‘Super’ Hacker Jailed for 2 Years over DoS attack

A Spanish hacker who launched a denial of service attack that hobbled the net connections of an estimated three million users has been jailed for two years and fined 1.4m. Santiago Garrido, 26, (AKA Ronnie and Mike25) launched the attack using a computer worm in retaliation for been banned from the popular “Hispano” IRC chat […]

Tags: , , , , , , ,

Posted in: General Hacking | Add a Comment

BackTrack – A merger between WHAX and Auditor

BackTrack is the result of the merging of two Innovative Penetration Testing live Linux distributions namely Whax and Auditor. Combining the best features from both distributions, and paying special attention to small details, this is probably the best version of either distributions to ever come out. Based on SLAX (Slackware), BackTrack provides user modularity. This […]

Tags: , , , , , , , ,

Posted in: General Hacking, Hacking Tools, Security Software | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·