Tag Archive | "cracking"


11 September 2006 | 69,454 views

LCP – A Good FREE Alternative to L0phtcrack (LC5)

Since Symantec stopped development of L0phtcrack many people have been looking for alternatives. So don’t forget.. Jack the Ripper is still king Medusa is good Ophcrack for Rainbow Tables And now one more, introducting LCP, which we have talked about before in the article Password Cracking with Rainbowcrack and Rainbow Tables. LCP is freeware! The […]

Continue Reading


20 June 2006 | 5,435 views

Money Lost Due to Cybercrime Down Again This Year!

It seems even though vendors are pushing their snakeoil harder than ever, the actual figures show that the money lost due to cybercrime has decreased every year for the last four years! Perhaps people are finally getting more secure, it’s not suprising with the advent of cheaper and easier to use intrusion detection and intrusion […]

Continue Reading


28 March 2006 | 137,024 views

Ophcrack 2.2 Password Cracker Released

Ophcrack is a Windows password cracker based on a time-memory trade-off using rainbow tables. This is a new variant of Hellman’s original trade-off, with better performance. It recovers 99.9% of alphanumeric passwords in seconds. We mentioned it in our RainbowCrack and Rainbow Tables article. Changes: (feature) support of the new table set (alphanum + 33 […]

Continue Reading


13 March 2006 | 9,529 views

Donations Flood in for Guilty Security Researcher Guillaume Tena

This could be the end of reverse engineering in France sadly, I hope it doesn’t have repucussions in other parts of the world. I think it’s the end of using reverse engineering tools to find flaws in France. Maybe the next step will be to forbid the possession of debuggers and disassemblers. It’s a valid […]

Continue Reading


27 February 2006 | 416,248 views

Password Cracking with Rainbowcrack and Rainbow Tables

What is RainbowCrack & Rainbow Tables? RainbowCrack is a general propose implementation of Philippe Oechslin’s faster time-memory trade-off technique. In 1980 Martin Hellman described a cryptanalytic time-memory trade-off which reduces the time of cryptanalysis by using precalculated data stored in memory. This technique was improved by Rivest before 1982 with the introduction of distinguished points […]

Continue Reading


17 February 2006 | 34,657 views

Locate anyone in the UK via SMS

By using one of the many mobile phone location tracking services aimed at businesses or concerned parents, and some trickery it is possibly to get almost anyone’s mobile phone position without their agreement. All that is required is their mobile phone number, and carrier. Over the past year a number sites have popped up offering […]

Continue Reading


13 February 2006 | 5,190 views

Call for Authors and New Members for Relaunch of Darknet

Darknet is currently undergoing a relaunch, it has been rebuilt from scratch in a new style using a powerful and extensible open source CMS called WordPress. If you wish to contribute please contact us for access to the site. We are looking for people to write articles about anything to do with Hacking, Cracking or […]

Continue Reading


08 February 2006 | 36,377 views

Welcome to Darknet – The REBIRTH

Next to do: 1) Think up some ideas for posts 2) Get some members to join up as authors 3) Get some input on the site design 4) Write the about page (Dig up those old memories, perhaps go back through the old Darknet HTML site) 5) Get some incoming links 6) Get some sites […]

Continue Reading


Popular Tags

computer-security · darknet · exploits · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · Information-Security · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·