Archive | UNIX Hacking




Intel Core 2 Duo Vulnerabilities Serious say Theo de Raadt

The scariest type of all, hardware vulnerabilities. Security guru and creator of OpenBSD Theo de Raadt recently announced he had found some fairly serious bugs in the hardware architecture of Intel Core 2 Duo processors. He goes as far as saying avoid buying a C2D processor until these problems are fixed. A prominent software developer […]

Tags: , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hardware Hacking, UNIX Hacking | Add a Comment

Sun Solaris 10 – Free Offer – Media DVD

It’s good to have a variety of Operating Systems in your hacking lab at home, it helps you get familiar with them..as to break things, you have to know how they work first. So get to know Solaris, they have some pretty neat security related software inside their OS and generally are pretty good when […]

Tags: , , , , , , ,

Posted in: General News, UNIX Hacking | Add a Comment

0-day Vulnerability Effects Solaris – Disable Telnet NOW!

Solaris is pwned by a similar vulnerability to one discovered on AIX systems in 1994. Yes people that’s 13 years ago…and Sun are still vulnerable, as reported by SANS. The following will give you root on a lot of Solaris systems:

Cool eh? The Internet Storm Center is urging system administrators to disable or […]

Tags: , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Network Hacking, UNIX Hacking | Add a Comment

Sealing Wafter – Defend Against OS Fingerprinting for OpenBSD

One way to defend against OS fingerprinting from tools such as nmap, queso, p0f, xprobe etc is to change the metrics that they base their analysis on. One way to do this with OpenBSD is to use Sealing Wafter. Goals of Sealing Wafter: 1. To reduce OS detection based on well known fingerprints network stack […]

Tags: , , , , , , ,

Posted in: Countermeasures, Network Hacking, UNIX Hacking | Add a Comment

Post-Mortem Data Destruction

1. Introduction This article describes and partly implements a method to delete or re-locate, potentially sensitive and / or incriminating information from your UNIX flavoured machine, after the sad event of your death. An older version of this article has been published before, yet it has since disappeared from the Internet and the Google cache; […]

Tags: , , , , , ,

Posted in: Countermeasures, Privacy, UNIX Hacking | Add a Comment

Free Prep Material for LPI Linux Certification (LPI 201 and 202)

Here’s a series of well written IBM Linux tutorials to help you learn Linux fundamentals and prepare for system administrator certification. The LPI prep tutorials help you prepare for the topics in LPI exam 201 and the topics in LPI exam 202. You can find more about the certification at the Linux Professional Institute. I’ve […]

Tags: , , , , , ,

Posted in: UNIX Hacking | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·