Archive | Linux Hacking


08 June 2007 | 9,831 views

stealth techniques – syn

Or half-open scanning technique is the first of three to come series about stealth scanning… The other two are Xmas/Fin/Null and idle/zombie scan techniques… Intro This is a series of three to come articles about stealth scanning, everything that I am going to present is hping oriented so if you want to learn this techniques […]

Continue Reading


01 June 2007 | 18,979 views

Sguil – Intuitive GUI for Network Security Monitoring with Snort

Sguil (pronounced sgweel) is probably best described as an aggregation system for network security monitoring tools. It ties your IDS alerts into a database of TCP/IP sessions, full content packet logs and other information. When you’ve identified an alert that needs more investigation, the sguil client provides you with seamless access to the data you […]

Continue Reading


22 May 2007 | 20,636 views

Nemesis – Packet Injection Suite

Nemesis is a command-line network packet crafting and injection utility for UNIX-like and Windows systems. Nemesis, is well suited for testing Network Intrusion Detection Systems, firewalls, IP stacks and a variety of other tasks. As a command-line driven utility, Nemesis is perfect for automation and scripting. Nemesis can natively craft and inject packets for: ARP […]

Continue Reading


02 May 2007 | 9,341 views

That ‘magic’ number

09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0 This is everywhere today. Every major news site has this ‘magic’ number in it. Digg.com had stories with more than 24.000 diggs (that’s actually the first time I see that many). In case you’ve been in a cave for […]

Continue Reading

Tags: , , , ,

24 April 2007 | 7,077 views

Techm4sters Releases ProTech Security Distribution

Techm4sters e-mailed us recently to let us know about their new security distro called ProTech, we haven’t had time to download it and test it yet but it certainly looks promising. – What is PROTECH? Protech is a very light live security distribution based on Ubuntu Linux. – Is this like Nubuntu? It is similar, […]

Continue Reading


17 April 2007 | 21,973 views

Damn Vulnerable Linux – DVL – IT-Security Attack and Defense

Damn Vulnerable Linux (DVL) is a Linux-based (modified Damn Small Linux) tool for IT-Security & IT-Anti-Security and Attack & Defense. It was initiated for training tasks during university lessons by the IITAC (International Institute for Training, Assessment, and Certification) and S²e – Secure Software Engineering in cooperation with the French Reverse Engineering Team. Damn Vulnerable […]

Continue Reading


13 April 2007 | 100,520 views

BackTrack v2.0 – Hackers LiveCD Finally Released

BackTrack is the result of the merging of the two innovative penetration testing live linux distributions Auditor security collection and Whax. By combining the best features from both distributions and putting continous development energy, the most complete and finest security testing live distro was born: BackTrack BackTrack v.2.0 is finally released, it’s been a long […]

Continue Reading


29 January 2007 | 15,879 views

Hacking your $60 Router into a $600 Router

This is a bit of hacking in the original sense of the word, taking a $60 router and giving it the capabilities of something costing in the hundreds or thousands (enterprise level). Of all the great DIY projects at this year’s Maker Faire, the one project that really caught my eye involved converting a regular […]

Continue Reading


08 December 2006 | 9,570 views

Linux Reverse Engineering Hacker Challenge

The first round results of the Linux Reverse Engineering Hacker Challenge are out! http://www.hackerchallenge.org It was expected that an intermediate hacker with Linux experience should be able to defeat the protection(s) in less than 10 hours. Participants may earn up to $4100 USD. A total of 93 individuals registered to participate in the first Hacker […]

Continue Reading


14 July 2006 | 15,346 views

Linux Kernel 2.6.x PRCTL Core Dump Handling – Local r00t Exploit ( BID 18874 / CVE-2006-2451 )

A working version of the exploit used to escalate privileges to root in the recent Debian breakin, ah another root kernel exploit. It’s to do with the way the kernel handles file permissions (or lack of) on core dumps. Linux kernel is prone to a local privilege-escalation vulnerability. A local attacker may gain elevated privileges […]

Continue Reading