Tag Archives | hacking




Information about the Internet Explorer Exploit createTextRange Code Execution

Internet Storm Center’s always informative Diary has some good information. At the urging of Handler Extraordinaire Kyle Haugsness, I tested the sploit on a box with software-based DEP and DropMyRights… here are the results: Software-based DEP protecting core Windows programs: sploit worked Software-based DEP protecting all programs: sploit worked DropMyRights, config’ed to allow IE to […]

Tags: , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Windows Hacking | Add a Comment

Spammer gets 8 years in Jail for Identity theft

Good I say, nothing worse than a spammer. A bulk e-mailer who looted more than a billion records with personal information from a data warehouse has been sentenced to eight years in prison, federal prosecutors said Wednesday. Scott Levine, 46, was sentenced by a federal judge in Little Rock, Ark., after being found guilty of […]

Tags: , , , , ,

Posted in: General Hacking | Add a Comment

Is Open Source Really More Secure?

Is Open Source more secure? That’s a question that can be answered with both yes and no. Not only that, but the reasons for the “yes” and the “no” are fairly much the same. Because you can see the source the task of hacking or exploiting it is made easier, but at the same time […]

Tags: , , , , ,

Posted in: General Hacking, Web Hacking | Add a Comment

Elevator/Lift Hacking !!!!!

This is old news to those who already knows about it (Found out about it last year and tested it till now). But i just had to try it before actually posting it up. Do you get tired of being in an elevator and someone else gets on every other floor in between the floors […]

Tags: , , , , , , , ,

Posted in: General Hacking, Hardware Hacking | Add a Comment

Who is Darknet?

Well seen as though I tell the others to do some kind of introduction, probably I should do one for myself too. Then I started out with a Spectrum ZX-81 back in the olden days, typing whole games out of the Spectrum magazines I picked up from charity shops. Yah it had no tape drive, […]

Tags: , , , , , , , , ,

Posted in: Authors | Add a Comment

Windows Rootkits

Windows Rootkits are a big rarity in this modern web hacking tehnology… I won’t speak exactly about rootkits, because it’s impropriate to call them that way… why? Well rootkits are programs that aid you in getting access to root level users… So in the case we are using Windows rootkits we should call them admkits […]

Tags: , , , ,

Posted in: Malware, Windows Hacking | Add a Comment

Password Cracking with Rainbowcrack and Rainbow Tables

What is RainbowCrack & Rainbow Tables? RainbowCrack is a general propose implementation of Philippe Oechslin’s faster time-memory trade-off technique. In 1980 Martin Hellman described a cryptanalytic time-memory trade-off which reduces the time of cryptanalysis by using precalculated data stored in memory. This technique was improved by Rivest before 1982 with the introduction of distinguished points […]

Tags: , , , , , , , , , ,

Posted in: General Hacking, Hacking Tools, Password Cracking | Add a Comment

Spanish ‘Super’ Hacker Jailed for 2 Years over DoS attack

A Spanish hacker who launched a denial of service attack that hobbled the net connections of an estimated three million users has been jailed for two years and fined 1.4m. Santiago Garrido, 26, (AKA Ronnie and Mike25) launched the attack using a computer worm in retaliation for been banned from the popular “Hispano” IRC chat […]

Tags: , , , , , , ,

Posted in: General Hacking | Add a Comment

Popular Tags

computer-security · darknet · Database Hacking · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · XSS ·