«
Expand/Collapse
41 items tagged "fake"
Related tags:
webcam [+],
hacks [+],
crash [+],
wmv file [+],
sshd [+],
script kiddies [+],
proof of concept [+],
malware [+],
login attempts [+],
login [+],
facebook [+],
dictionary attack [+],
crash proof [+],
warning [+],
virus [+],
security [+],
hackers [+],
antivirus [+],
anti virus [+],
android [+],
youtube [+],
wizzard [+],
weapons [+],
wayne [+],
way [+],
virus scanners [+],
virus infection [+],
video [+],
victims [+],
utempter [+],
update [+],
tupac [+],
trojan [+],
than [+],
targets [+],
syria [+],
spam [+],
social networks [+],
social [+],
sites [+],
siren [+],
shotgun [+],
sends [+],
send [+],
segment led displays [+],
security software [+],
s. hacking [+],
ruse [+],
remove [+],
receipt [+],
real [+],
power outage [+],
post [+],
portal [+],
pop3 daemon [+],
pop [+],
poc [+],
photo tag [+],
photo [+],
pbs [+],
nixie tubes [+],
nixie clock [+],
nixie [+],
news [+],
networks [+],
mystery deepens [+],
mobile platform [+],
mobile [+],
million [+],
merchants [+],
memo [+],
manipulation [+],
major websites [+],
mail [+],
macdefender [+],
mac users [+],
logs [+],
jail [+],
iphone [+],
invisible camera [+],
india [+],
icq [+],
huge rise [+],
home [+],
hide android [+],
hacker [+],
hack [+],
government official [+],
google [+],
gauge shotgun [+],
firewall programs [+],
firefox [+],
fake news [+],
fake memo [+],
fake mail [+],
fabian [+],
digital [+],
day [+],
daemon [+],
crooks [+],
crims [+],
creating [+],
comments section [+],
clock [+],
certificate [+],
captive portal [+],
captive [+],
cannon fires [+],
cameras [+],
camera flash [+],
camera [+],
bow [+],
botnet [+],
boarding [+],
bird [+],
biophilla [+],
belongings [+],
barry [+],
bait cars [+],
attack targets [+],
attack [+],
arrows [+],
antivirus software [+],
antivirus program [+],
anti [+],
angry [+],
amazon [+],
airbase [+],
aim [+],
activists [+],
Wireless [+],
Software [+],
Skype [+]
-
-
7:25
»
Hack a Day
It’s time once again for everyone’s favorite comments section game: Real or Fake? This week we’re looking into this 12 gauge shotgun bow. Why use arrows when you can fire shells? This gentleman has apparently removed the stock of a 12 gauge shotgun and positioned the barrel as if it were an arrow. When he [...]
-
-
16:53
»
Packet Storm Security Recent Files
This is a fake sshd which can be used to log common login attempts which are typically used by scammers / spammers / script kiddies to attempt to gain access to servers. It does not modify OpenSSH and uses libssh instead. There is no valid way to login to a shell, can be used to tarpit / delay attackers and can be used to steal the entries used in a dictionary attack.
-
16:53
»
Packet Storm Security Tools
This is a fake sshd which can be used to log common login attempts which are typically used by scammers / spammers / script kiddies to attempt to gain access to servers. It does not modify OpenSSH and uses libssh instead. There is no valid way to login to a shell, can be used to tarpit / delay attackers and can be used to steal the entries used in a dictionary attack.
-
16:53
»
Packet Storm Security Misc. Files
This is a fake sshd which can be used to log common login attempts which are typically used by scammers / spammers / script kiddies to attempt to gain access to servers. It does not modify OpenSSH and uses libssh instead. There is no valid way to login to a shell, can be used to tarpit / delay attackers and can be used to steal the entries used in a dictionary attack.
-
-
16:07
»
Hack a Day
One of [Wayne’s] relatives had their house robbed during a blizzard/extended power outage, and as is typically the case, none of the stolen items were recovered. His nephew’s PS3 was among the pilfered belongings, which didn’t sit well with him. Taking a cue from police “bait cars”, he thought it would be cool to fit [...]
-
-
11:01
»
Hack a Day
It’s time for everyone’s favorite comment thread game: Real or Fake? This week’s edition comes in from a tip that [Fabian] sent us about the music video Bright Siren by the band Androp. The video starts by showing bundles of cables being sorted and connected to breadboards. We get a brief shot of a [...]
-
-
7:50
»
Packet Storm Security Recent Files
Whitepaper called Fake Malware and Virus Scanners. Rogue security software reports a virus infection, even if your computer is clean. This kind of "software" could also fail to report viruses when your computer is infected. This document show what are the mechanisms to obfuscate this process.
-
-
9:45
»
Hack a Day
Once again it’s time for you, the sharp-eyed readers of Hack a Day, to decide whether the following video demonstrates technology at its finest, or if it is complete hogwash. This edition of Real or Fake? is brought to us by Hack a Day reader [Wizzard] who sent us a link to “The Invisible Camera“ [...]
-
-
9:00
»
Hack a Day
[Barry] didn’t want to deal with the voltages involved in using a Nixie display so he built this clock to look like it has Nixie tubes. He’s made 7-segment LED displays using some channel material, and mounted them so they look like they’re hovering above the clock base. Once everything was hooked up he added [...]
-
-
2:26
»
remote-exploit & backtrack
Hi guys
i have been playing around with Rogue APs for a little while with Airbase and mitmap..
What i was thinking is if it would be possible to add a captive portal to the fake ap, so anyone who connects to it is redirected to a specific webpage.
I have tried messing with other captive portall/firewall programs like zeroshell and pfsense, but both of these run from a live cd and need a whole other computer to run.
i have heard you can achieve the captive portal by using iptables also..
if this is possible can some one explain how to do this in backtrack 4., and if there is any other possible ways as im pretty stuck..
thanks a lot...
Cee:)