«
Expand/Collapse
492 items tagged "hacking"
Related tags:
security [+],
google [+],
web application security [+],
news [+],
General [+],
usa [+],
russia [+],
penetration [+],
networks [+],
windows [+],
web hacking [+],
video [+],
kenneth geers [+],
geers [+],
fun [+],
foreign [+],
authors [+],
application [+],
Hardware [+],
tool [+],
testing [+],
security guide [+],
profit [+],
phone hacking [+],
penetration testers [+],
ipv6 networks [+],
ipv [+],
hack [+],
asia [+],
Tools [+],
web application [+],
voip [+],
sql [+],
shah tags [+],
scandal [+],
phone [+],
paris [+],
nmap [+],
mysql [+],
foreign language [+],
droid [+],
cesar cerrudo [+],
android [+],
read [+],
vulnerability scanner [+],
vodafone [+],
thc [+],
sky broadband [+],
security scanner [+],
ruxcon [+],
network [+],
mac osx [+],
mac os x [+],
mac os [+],
language [+],
injection [+],
hollywood [+],
hacking windows [+],
global [+],
fyodor tags [+],
fyodor [+],
facebook [+],
chaos communication camp [+],
case study [+],
broadband [+],
arduino [+],
adam laurie [+],
darknet [+],
year [+],
x event [+],
wireless network [+],
wifi [+],
weblogic [+],
web browser [+],
transportation [+],
talk [+],
stephen cobb [+],
sql injection [+],
source [+],
society [+],
skin [+],
set [+],
server [+],
security auditors [+],
security 2001 [+],
schools in germany [+],
school [+],
scanner [+],
satellite [+],
reverse engineering [+],
released [+],
raspberry [+],
proof of concept [+],
project [+],
productivity tool [+],
presentation slides [+],
presentation [+],
presenation [+],
pentesters [+],
password [+],
part [+],
paper [+],
one way [+],
one [+],
nils magnus tags [+],
nfspy [+],
newbies [+],
networking [+],
multi [+],
mole [+],
misc [+],
microsoft windows [+],
metasploit [+],
martin herfurt [+],
marcel holtmann [+],
management event [+],
malware [+],
magictree [+],
macs [+],
lulzsec [+],
johnny long [+],
jeremiah grossman [+],
iphone [+],
ios [+],
intrusion [+],
introduction [+],
intranet websites [+],
internet corporation for assigned names and numbers [+],
internals [+],
information [+],
industrial civilisation [+],
ilya v. vasilyev [+],
icann [+],
home [+],
hollywood studios [+],
hat europe [+],
hacking microsoft [+],
hacking mac [+],
hackaday [+],
germany [+],
full disclosure [+],
framework [+],
fossil fuel production [+],
file [+],
fanboys [+],
europe [+],
esteban martnez [+],
enumeration [+],
education relations [+],
edge techniques [+],
easy [+],
e book [+],
download [+],
databases [+],
database sql [+],
course [+],
computer [+],
client [+],
charlie miller [+],
cellphones [+],
car [+],
boolean query [+],
bluetooth [+],
basics [+],
audit tool [+],
attack [+],
art [+],
armitage [+],
adam laurie marcel holtmann [+],
Wireless [+],
hacks [+],
black hat [+],
zte zxdsl [+],
zed attack [+],
xmpp [+],
x scan [+],
wpscan [+],
world class web [+],
world [+],
working conditions [+],
wordpress [+],
while [+],
wheel [+],
websurgery [+],
websites [+],
websecurify [+],
web broswer [+],
web application servers [+],
web application security assessment [+],
web application developers [+],
wavsep [+],
water wall [+],
vulnerability tests [+],
vr6 engine [+],
vlan [+],
vista [+],
version 6 [+],
vega [+],
value [+],
vacuum [+],
use [+],
usable machine [+],
united nations agency [+],
united nations [+],
united [+],
uncovered [+],
uk based [+],
trust relationships [+],
troy [+],
transparency film [+],
trampofoil [+],
train [+],
trail [+],
trade show booth [+],
toy [+],
tool web [+],
tool version [+],
told [+],
time [+],
threat [+],
threaded [+],
thermal imaging cameras [+],
testing tool [+],
teenager [+],
teenage [+],
tcp ports [+],
tcp [+],
targeted [+],
target server [+],
target [+],
takeover [+],
tag guns [+],
tag [+],
syria [+],
swedish [+],
suspected [+],
supervisory control and data acquisition [+],
supermarkets [+],
sunday mirror [+],
summer [+],
suite v1 [+],
suite [+],
subway [+],
storyboard quick [+],
storage solution [+],
steve jobs [+],
steve [+],
stereo [+],
stefan arentz [+],
stealing [+],
starts [+],
starter kit [+],
stack buffer [+],
ssl [+],
spying [+],
spree [+],
sorrow [+],
soldering iron [+],
software testing tool [+],
software modifications [+],
social interactions [+],
snide [+],
skipfish [+],
skin temperature [+],
skimming [+],
shop vacuums [+],
shop vacuum [+],
shop [+],
shiny new toy [+],
shay chen [+],
shady [+],
server side applications [+],
sequel [+],
sensor package [+],
security vulnerability [+],
security tool [+],
security lab [+],
security conference [+],
security authors [+],
security 2002 [+],
secret lair [+],
search directives [+],
sean convery [+],
sealer [+],
sd card [+],
scanners [+],
scanner x [+],
scanner evaluation [+],
scada [+],
satellite decoders [+],
samurai [+],
routine activities [+],
router [+],
roundup [+],
root [+],
roofus [+],
romanians [+],
rfidiots [+],
rfid [+],
reviews [+],
revenue [+],
return [+],
retrospective [+],
result [+],
researchers [+],
reg roundup [+],
rebekah brooks [+],
rebekah [+],
real time clock [+],
re inventing [+],
rat [+],
raoul chiesa [+],
radio [+],
quits [+],
quarter [+],
python script [+],
purpose [+],
proxy [+],
prosecutions [+],
property [+],
professional training [+],
productivity [+],
power [+],
portscan [+],
port scanner [+],
pool [+],
platform [+],
place [+],
physical distribution [+],
phishing [+],
pgp [+],
peter fuhrmann [+],
performance [+],
perfect code [+],
percent [+],
pcs [+],
pc mac [+],
patent attorney [+],
patator [+],
party [+],
panel [+],
owasp [+],
outdoor cooking [+],
original works [+],
org uk [+],
oracle web [+],
oracle databases [+],
oracle [+],
open source web [+],
open source tools [+],
open source platform [+],
open source initiative [+],
open ports [+],
open [+],
old [+],
oil temperature [+],
occurence [+],
nitesh dhanjani [+],
nfs export [+],
nfs [+],
news of the world [+],
news corp [+],
new kid on the block [+],
network vulnerability scanner [+],
network storage servers [+],
network storage [+],
network discovery [+],
neat effects [+],
mysterious [+],
mysqlpasswordauditor [+],
mysql password [+],
mysql database servers [+],
myler [+],
multifunction [+],
ms sql [+],
mount nfs [+],
money [+],
modem wireless [+],
mitm [+],
military network [+],
military [+],
microcontroller [+],
mcdonald [+],
mark will [+],
mark lottor [+],
mark collier [+],
mapping tool [+],
mantra [+],
main goal [+],
mail accounts [+],
magic wand [+],
macro code [+],
macro button [+],
macro [+],
mac [+],
lou [+],
lion [+],
linux windows [+],
linux mac [+],
linux [+],
lilith [+],
life [+],
licensed security [+],
libyan air [+],
leds [+],
led [+],
layer [+],
lawyer [+],
law [+],
last chance [+],
laser [+],
lamp [+],
lament [+],
lab [+],
l. r. pennasilico [+],
kingston wi [+],
kingston [+],
kieran [+],
kid on the block [+],
kernel [+],
karl [+],
k upgrade [+],
k c [+],
justin clarke nitesh [+],
justin clarke [+],
josh wright [+],
jon callas [+],
john knittel [+],
javascript [+],
jaquard [+],
james murdoch accuses [+],
james murdoch [+],
jailed [+],
jack [+],
island [+],
ipod [+],
ipad [+],
ip address range [+],
invisible fence [+],
inventory [+],
intranet [+],
internet war [+],
international [+],
interface [+],
interesting articles [+],
interactive sitemap [+],
intellectual property theft [+],
intellectual [+],
impressive array [+],
id spoofing [+],
hopper [+],
high score [+],
hdmi [+],
haunted forest [+],
harmless mischief [+],
haley admits [+],
hacking computers [+],
hackers [+],
hacker world [+],
gui tool [+],
group team [+],
grossman [+],
grills [+],
griffin [+],
greengoose [+],
green goose [+],
grades [+],
gps [+],
government agencies [+],
goose [+],
goofs [+],
goofile [+],
goodork [+],
golismero [+],
gammarays [+],
galvanic skin response [+],
fuzzing [+],
full [+],
fuhrmann [+],
forest [+],
ford forcus [+],
ford focus [+],
ford [+],
force [+],
for [+],
food sealer [+],
food [+],
floating pool light [+],
flexible usage [+],
first quarter [+],
first five minutes [+],
firefox [+],
fire base [+],
fingerprint scanners [+],
fingerprint reader [+],
fingerprint [+],
filetype [+],
files names [+],
fence system [+],
feature authors [+],
falls [+],
exposed [+],
exploithub [+],
european banks [+],
european [+],
ethernet switches [+],
essex [+],
errors [+],
engineering service [+],
engineering [+],
engineer [+],
endler [+],
end [+],
elearnsecurity [+],
einstein [+],
edition v1 [+],
east coast [+],
dual core [+],
dtv [+],
drive [+],
domain [+],
doing the rounds [+],
dog collars [+],
dog [+],
distribution media [+],
displays [+],
disenchanted forest [+],
director steps [+],
dirbuster [+],
different colors [+],
detroit [+],
dell poweredge 2800 [+],
dell poweredge [+],
debated [+],
david endler [+],
dave [+],
data [+],
dan griffin tags [+],
daily routine [+],
d test [+],
custom guns [+],
crowdsourced [+],
crowdre [+],
criminals [+],
creative idea [+],
crafting [+],
core computer [+],
cooperation [+],
cooking [+],
convery [+],
convergence [+],
contraption [+],
continuous improvements [+],
conference announcement [+],
computer users [+],
computer interface [+],
computer hacking [+],
complex software [+],
compact case [+],
commando style [+],
commando [+],
command line tool [+],
command line interface [+],
com [+],
color [+],
collaborative analysis [+],
coliseum [+],
cold war [+],
coders [+],
codename [+],
co author [+],
cmd [+],
clubhack [+],
close [+],
clock [+],
client tool [+],
citrix [+],
chrome [+],
china [+],
charged [+],
ceo of apple [+],
central african nation [+],
central african [+],
cellular phones [+],
cassette player [+],
case [+],
car stereo [+],
capitalist economy [+],
cans [+],
cameroon [+],
busted [+],
burp [+],
buffer overflow [+],
brute forcer [+],
browser technologies [+],
browser [+],
brown emails [+],
brooks [+],
brad [+],
box approach [+],
book [+],
bodybugg [+],
bionic man [+],
bill zimmerman [+],
bff [+],
bengrosser [+],
beer cans [+],
beer [+],
beat [+],
bazaar [+],
basic [+],
ball [+],
badwolf [+],
backdoor [+],
auxiliary modules [+],
author [+],
auditing software [+],
audit framework [+],
attiny [+],
attempts [+],
atm skimming [+],
atm [+],
argus [+],
arachni [+],
april fools day [+],
apple [+],
appear [+],
anti [+],
announcement [+],
andy davis tags [+],
andy davis [+],
andrew [+],
and [+],
air defenses [+],
agency [+],
administrative interface [+],
added interest [+],
adam laurie tags [+],
access [+],
ac outlet [+],
Pentesting [+],
Hackerspaces [+],
Ask [+],
1 billion [+],
slides [+],
whitepaper [+],
web [+],
audio [+],
chaos communication congress [+],
database [+],
zusman,
zombie,
zap,
xss,
x appletv,
x 509,
wvs,
wpa psk,
wpa,
wordlists,
wordlist generator,
wordlist,
word list,
with,
wireless keyboards,
wireless keyboard,
wireless gsm,
wire strippers,
wire,
winsock functions,
windows password cracker,
winappdbg,
win32 api,
wimax,
wikileaks,
wiimote,
wii,
wifite,
wife,
widgets,
wi fi,
wep wpa,
wep key,
wep,
website,
webraider,
web testing,
web sessions,
web server platforms,
web scanner,
web developers,
web based software,
web automation,
web apps,
web applications,
weaknet,
way,
watobo,
warranty,
warfare,
wappalyzer,
waf,
vulnerability research,
vulnerability assessment,
video training,
video hardware,
vide,
vibrations,
vault,
variants,
user,
usb drives,
usb,
unknown school,
universe,
ukrainian,
ufos,
ufology,
ufo event,
udp,
ubuntu,
typical error message,
tyler,
twitterpassworddecryptor,
twitter,
tv hacking,
tutorial,
tshark,
trust,
treasury,
travis goodspeed,
travis,
traversal,
traffic generator,
traffic,
trace execution,
touch,
toolkit,
tool suite,
tony flick tags,
tjx,
tinfoil hat,
thrustmaster formula 1,
thomas wilhelm tags,
thomas wilhelm,
thing,
the rise,
thc hydra,
than iloveyou,
texture,
textfiles,
text password,
testing tools,
tester,
test,
tenn.,
tenn,
teddy ruxpin doll,
teddy ruxpin,
teddy,
teaches,
tcp udp,
tastebuds,
target host,
target domain,
tags,
ta mapper,
suspect,
sures,
subaru,
strom carlson,
strom,
stripper,
story,
stinkin badges,
stinkin,
stereotypes,
stealthiness,
startups,
ssh ftp,
sqlninja,
sqlmap,
sqlinject finder,
sql server version,
sprites,
sprite,
sport,
specific software,
speaker setup,
speaker line,
spain,
space,
sous,
sony,
software user,
socks proxy,
socks,
socket programming,
social engineering,
social engineer,
smart card,
smart,
sleep lab,
sle,
skiddies,
skewl,
site,
sipvicious,
sip voip,
sip,
simulator,
siddharth tags,
shawn merdinger,
sets,
sessionthief,
session profiles,
session,
servers,
serial protocol,
sequences,
senior executive fingered,
security tasks,
security study,
security experience,
security event,
security community,
security audits,
security assessment,
secret paths,
secrecy,
searchdiggity,
script kiddy,
science event,
satellite hacking,
satellite event,
sandy clark tags,
sandy clark,
sahi,
safety checks,
runtimes,
runtime,
ruby,
rsmangler,
rotary phone,
robust framework,
robotic life,
robert,
rob rehrig,
risk,
rick hayes,
richard theime,
rich internet,
ria,
reverse ip,
restroom,
research toolkit,
research partners,
required,
reporter,
replay attack,
repetitive elements,
remote exploit,
releases,
related security,
rehrig,
reframeworker,
reference,
recursive algorithm,
reader,
rawcap,
raw sockets,
randy robbins,
rainbow,
quist,
python version,
python,
pwnat,
pwn,
proxy web,
proxocket,
proxies,
protocol handler,
protocol,
protecting,
prosecution,
prosecuted,
professional certs,
price tags,
price,
post,
port scanners,
port forwarding,
port,
poor passwords,
pki,
physical security,
philippe langlois,
pete herzog,
perl tool,
period of time,
pentbox,
penetration tests,
penetration test,
pcap,
payload,
pattern sequences,
patryk,
path,
password hashes,
parallel network,
panda security,
palin,
packet data,
packet,
own,
out,
osborne reveals,
oracle database,
ophcrack,
open source utility,
open source tool,
online,
offline storage,
nwmap,
ntlm,
nook,
nix,
next generation,
next,
new malware,
new,
network stress,
network streams,
network sniffer,
network session,
network protocol analyzer,
network infrastructure,
network exploration,
network authentication,
netcast,
net,
ncrack,
nbtscan,
natural progression,
native environment,
nat to,
nat client,
nat,
nasa space shuttle,
nasa,
murdoch reporters,
murdoch,
multihash,
multicast networks,
ms sql server,
motion sickness,
monta elkins,
modified versions,
modern warfare,
modern man,
modern,
mobile,
mindflex,
mike zusman,
microsoft sql server,
microsoft,
microcontrollers,
michigan data,
michigan,
mice,
mhtml,
metro,
meta characters,
messagelabs,
memory trade,
medusa,
mechanix illustrated,
mccoy,
mastering,
masses,
mariposa,
mapper,
manual web,
mallory,
malaysia,
mainstream media,
luiz eduardo tags,
logon sessions,
login credentials,
login cracker,
login,
little teddy,
linux security,
linux environment,
line,
leopard,
legal,
led lamp,
layerone,
laurent oudot,
last time,
larry aiello,
langlois,
laboratory environment,
krakow,
knock,
kiosk vendors,
kiosk terminal,
kiosk,
kids,
keypad,
keynote,
keyboard emulation,
kevin estis,
keith biddulph,
keimpx,
junos,
juniper junos,
josh marks,
joseph menn,
jordan,
joomla,
jon mccoy,
john heasman,
john,
jeremy rauch,
jacob,
iso,
ipv6 protocol,
ipv6 project,
ipod touch,
inundator,
intrusion detection systems,
internet control message protocol,
internet applications,
interesting stuff,
interactive kiosk,
interactive content,
instrumentation,
inspathx,
injector,
inguma,
infrastructure,
infosec,
information security industry,
information gathering,
infector,
industry,
india,
incident database,
incident,
im me,
ikat,
ids,
identify,
icmp,
huge wave,
http,
hotz,
hotmail,
hospital,
home monitoring,
holland,
high speed network,
high availability,
herzog,
hazmat,
havij,
hatkit,
hardware hacking,
handshakes,
hand sanitizers,
hand sanitizer dispensers,
hand,
half,
hal,
hacking tutorials,
hacking tutorial,
hacking tool,
hacking reference,
hacking games,
hacking game,
hacker stereotypes,
hacker attack,
hacker,
hack story,
hack in the box,
gustibus,
gui application,
gui,
gsm,
groundspeed,
grid,
green,
graphical user interface,
graphical network,
government,
googlediggity,
goodspeed,
good,
goncalves,
gold rush,
gnu linux,
gnu,
gns,
geo metro,
geo,
generator,
gem,
game,
fuzzer,
fuzzdb,
fuzz,
future,
ftp servers,
frontier,
free open source,
france,
frame options,
formula 1 racing,
forklift,
forensic web,
forensic data,
forensic analysis,
forensic,
forcer,
foca,
flick,
firmware,
firesheep,
final frontier,
final 4,
fifth beta,
federal grand jury,
fatal system error,
fancy button,
fair share,
faceniff,
f22 raptor,
extrusion,
extortion racket,
external libraries,
extensible firmware interface,
extensible,
evasion,
erp,
eric,
entertainment,
enjoyment,
endemic,
enabled,
element set,
electronic price,
electronic,
electric grid,
electric,
ed nisley,
economy,
e mail,
dynamic nature,
dutch court,
dutch,
dubai,
dril,
don,
domain tool,
dom exploiting,
dom binding,
dom,
doll,
dojo,
docsis,
dll,
disobedient,
disk,
discovery exploration,
directory traversal,
dino,
development initiative,
detection script,
detecting,
desktop connections,
denies,
delta theta,
de gustibus,
ddosim,
day,
david kennedy,
david byrne tags,
david byrne,
dave king,
database servers,
data execution prevention,
data consolidation,
danny quist,
cybercrime,
custom word,
cupp,
cryptography tools,
cryptography,
cross site scripting,
cross,
criminal charges,
criminal,
craig,
cracking password,
covert channel,
court,
couple of days,
copenhagen,
cooks,
content management systems cms,
content management systems,
content,
conspirator,
conference,
computing,
complementary tool,
compendium,
commerce systems,
command execution,
command,
combination,
cms,
cloud,
client communication,
classic,
class action lawsuit,
cisco ios,
chevrolet volt,
character transformations,
character sets,
ccavenue,
cbi,
cat,
cars,
capitalism,
california,
cakes,
button,
bum,
build,
bruter,
brute,
bruno goncalves,
botnet,
bluetooth enabled mobile phones,
bizploit,
biohacking,
bing api,
bing,
biddulph,
bidding,
beta,
ben nelson,
ben heck,
ben,
begin,
bedbugs,
bedbug,
batteries,
badges,
available tools,
auxiliary input,
aux in,
automation tool,
automation application,
automated,
auto industry,
auto,
authentications,
authentication credentials,
authentication,
audio hardware,
attempt,
army,
application asp,
apple tv,
annoying limitations,
andiparos,
analog phones,
analog,
anaheim california,
amazon ec2,
amazon,
alpha version,
alpha,
algorithm,
alex,
albert gonzalez claims,
albert gonzalez,
albert,
ajax,
added features,
adam dachis,
acunetix web vulnerability scanner,
acunetix,
act,
accurate estimation,
account passwords,
abu dhabi,
abstraction layer,
Tutorials,
Software,
Issues,
HackIt,
ExploitsVulnerabilities,
BackTrack
-
-
22:59
»
Darknet

exe2powershell is used to convert EXE to BAT files, the previously well known tool for this was exe2bat, this is a version for modern Windows.
This will convert any binary file (*.exe) to a BAT file, the resulting BAT file contains only echo commands followed by a PowerShell command to re-create the original binary file.
This kind of tool can be useful during a pen-test when you want to trigger a shell without any upload feature.
Read the rest of exe2powershell – Convert EXE to BAT Files now! Only available at Darknet.
-
-
23:11
»
Darknet

Stardox is a Python-based GitHub stargazers information gathering tool, it scrapes Github for information and displays them in a list tree view. It can be used for collecting information about your or someone else’s repository stargazers details.
GitHub allows visitors to star a repo to bookmark it for later perusal. Stars represent a casual interest in a repo, and when enough of them accumulate, it’s natural to wonder what’s driving interest.
Read the rest of Stardox – Github Stargazers Information Gathering Tool now! Only available at Darknet.
-
-
8:08
»
Darknet

ZigDiggity a ZigBee Hacking Toolkit is a Python-based IoT (Internet of Things) penetration testing framework targeting the ZigBee smart home protocol.
ZigBee continues to grow in popularity as a method for providing simple wireless communication between devices (i.e. low power/traffic, short distance), & can be found in a variety of consumer products that range from smart home automation to healthcare. Security concerns introduced by these systems are just as diverse and plentiful, underscoring a need for quality assessment tools.
Read the rest of ZigDiggity – ZigBee Hacking Toolkit now! Only available at Darknet.
-
-
16:47
»
Darknet

RandIP is a nim-based network mapper application that generates random IP addresses and uses sockets to test whether the connection is valid or not with additional tests for Telnet and SSH.
RandIP – Network Mapper Features
- HTTP and HTTPS enumeration
- Python enumeration exploits
- SSH enumeration exploits
- Logger and error-code handler
- SSH and Telnet Timeouts to prevent blocking
- SSH Enumerations work in tandem
You can download RandIP here:
randip-master.zip
Or read more here.
Read the rest of RandIP – Network Mapper To Find Servers now! Only available at Darknet.
-
-
23:35
»
Darknet

Slurp is a blackbox/whitebox S3 bucket enumerator written in Go that can use a permutations list to scan from an external perspective or an AWS API to scan internally.
There are two modes that this tool operates at; blackbox and whitebox mode. Whitebox mode (or internal) is significantly faster than blackbox (external) mode.
Blackbox (external)
In this mode, you are using the permutations list to conduct scans.
Read the rest of Slurp – Amazon AWS S3 Bucket Enumerator now! Only available at Darknet.
-
-
8:47
»
Darknet

Surprise, surprise, surprise – an internal audit of the US Government cyber security situation has uncovered widespread weaknesses, legacy systems and poor adoption of cyber controls and tooling.
US Government security has often been called into question but we’d hope in 2019 it would have gotten better and at least everyone would have adopted the anti-virus solution introduced in 2013..
A committee report (PDF) examining a decade of internal audits this week concluded that outdated systems, unpatched software, and weak data protection are so widespread that it’s clear American bureaucrats fail to meet even basic security requirements.
Read the rest of US Government Cyber Security Still Inadequate now! Only available at Darknet.
-
-
7:52
»
Darknet

BloodHound is for hacking active directory trust relationships and it uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment.
Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify. Defenders can use it to identify and eliminate those same attack paths. Both blue and red teams can use BloodHound to easily gain a deeper understanding of privilege relationships in an Active Directory environment.
Read the rest of BloodHound – Hacking Active Directory Trust Relationships now! Only available at Darknet.
-
-
1:06
»
Darknet

SecLists is the security tester’s companion. It’s a collection of multiple types of lists used during security assessments, collected in one place.
List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
The goal is to enable a security tester to pull this repository onto a new testing box and have access to every type of list that may be needed.
Contents of SecLists
Each section has tonnes of content including the below:
- Discovery lists (DNS, SNMP, Web content)
- Fuzzing Payloads (Databases, LFI, SQLi, XSS)
- Password lists (Common credentials, cracked hashes, honeypot captures, leaked lists)
- Data Pattern lists
- Payload files (Zip bombs, flash, images)
- Username lists (Honeypot captures)
- Web shells
Install SecLists
Zip
wget -c https://github.com/danielmiessler/SecLists/archive/master.zip -O SecList.zip \
&& unzip SecList.zip \
&& rm -f SecList.zip
Git (Small)
git clone --depth 1 https://github.com/danielmiessler/SecLists.git
Git (Complete)
git clone git@github.com:danielmiessler/SecLists.git
You can access all the lists here:
https://github.com/danielmiessler/SecLists
Read the rest of SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells now! Only available at Darknet.
-
-
19:50
»
Darknet

GoBuster is a Go-based tool used to brute-force URIs (directories and files) in web sites and DNS subdomains (with wildcard support) – essentially a directory/file & DNS busting tool.
The author built YET ANOTHER directory and DNS brute forcing tool because he wanted..
- … something that didn’t have a fat Java GUI (console FTW).
- … to build something that just worked on the command line.
- … something that did not do recursive brute force.
Read the rest of GoBuster – Directory/File & DNS Busting Tool in Go now! Only available at Darknet.
-
-
21:52
»
Darknet

BDFProxy allows you to patch binaries via MiTM with The Backdoor Factory combined with mitmproxy enabling on the fly patching of binary downloads (software updates for example) from vendors that don’t validate data integrity.
The Backdoor Factory allows you to patch binaries with shell-code so combining that with mitmproxy, which is a Python proxy-server that can catch HTTP, change traffic on the fly, replay traffic, decode and render primitive data types – gives you BDFProxy.
Read the rest of BDFProxy – Patch Binaries via MiTM – BackdoorFactory + mitmproxy now! Only available at Darknet.
-
-
23:26
»
Darknet

Domained is a multi tool subdomain enumeration tool that uses several subdomain enumeration tools and wordlists to create a unique list of subdomains that are passed to EyeWitness for reporting.
This produces categorized screenshots, server response headers and signature based default credential checking. It is written in Python heavily leveraging Recon-ng.
Domains Subdomain Enumeration Tools Leveraged
Subdomain Enumeraton Tools:
- Sublist3r
- enumall
- Knock
- Subbrute
- massdns
- Recon-ng
- Amass
- SubFinder
Reporting + Wordlists:
- EyeWitness
- SecList (DNS Recon List)
- LevelUp All.txt Subdomain List
Domained Subdomain Enumeration Tool Usage
--install/--upgrade Both do the same function – install all prerequisite tools
--vpn Check if you are on VPN (update with your provider)
--quick Use ONLY Amass and SubFinder
--bruteall Bruteforce with JHaddix All.txt List instead of SecList
--fresh Delete old data from output folder
--notify Send Pushover or Gmail Notifications
--active EyeWitness Active Scan
--noeyewitness No Eyewitness
-d The domain you want to preform recon on
-b Bruteforce with subbrute/massdns and SecList wordlist
-s n Only HTTPs domains
-p Add port 8080 for HTTP and 8443 for HTTPS
Subdomain Enumeration Examples
First Steps are to install required Python modules and tools:
sudo pip install -r ./ext/requirements.txt
sudo python domained.py --install
Example 1 – Uses subdomain example.com (Sublist3r (+subbrute), enumall, Knock, Amass, and SubFinder)
python domained.py -d example.com
Example 2: – Uses subdomain example.com with seclist subdomain list bruteforcing (massdns, subbrute, Sublist3r, Amass, enumall, and SubFinder), adds ports 8443/8080 and checks if on VPN
python domained.py -d example.com -b -p --vpn
Example 3: – Uses subdomain example.com with large-all.txt bruteforcing (massdns, subbrute, Sublist3r, Amass, enumall and SubFinder)
python domained.py -d example.com -b --bruteall
Example 4: – Uses subdomain example.com and only Amass and SubFinder
python domained.py -d example.com --quick
Example 5: – Uses subdomain example.com, only Amass and SubFinder and notification
python domained.py -d example.com --quick --notify
Example 6: – Uses subdomain example.com with no EyeWitness
python domained.py -d example.com --noeyewitness
Note: --bruteall must be used with the -b flag
You can download Domained here:
domained-master.zip
Or read more here.
Read the rest of Domained – Multi Tool Subdomain Enumeration now! Only available at Darknet.
-
-
12:17
»
Darknet

Gerix WiFi cracker is an easy to use Wireless 802.11 Hacking Tool with a GUI, it was originally made to run on BackTrack and this version has been updated for Kali (2018.1).
To get it up and running make sure you do:
apt-get install qt4-dev-tools
Running Gerix Wireless 802.11 Hacking Tool
$ python gerix.py
You can download Gerix here:
gerix-wifi-cracker-master.zip
Or read more here.
Read the rest of Gerix WiFi Cracker – Wireless 802.11 Hacking Tool With GUI now! Only available at Darknet.
-
-
5:47
»
Darknet

WepAttack is a WLAN open source Linux WEP key hacking tool for breaking 802.11 WEP keys using a wordlist based dictionary attack.
This tool is based on an active dictionary attack that tests millions of words to find the right key. Only one packet is required to start an attack.
What is a WEP Key?
Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in 1997, its intention was to provide data confidentiality comparable to that of a traditional wired network.[1] WEP, recognizable by its key of 10 or 26 hexadecimal digits (40 or 104 bits), was at one time widely in use and was often the first security choice presented to users by router configuration tools.
Read the rest of WepAttack – WLAN 802.11 WEP Key Hacking Tool now! Only available at Darknet.
-
-
8:38
»
Darknet

CTFR is a Python-based tool to Abuse Certificate Transparency Logs to get subdomains from a HTTPS website in a few seconds.
You missed AXFR technique didn’t you? (Open DNS zone transfers), so how does it work? CTFR does not use dictionary attack or brute-force attacks, it just helps you to abuse Certificate Transparency Logs.
What is Certificate Transparency?
Google’s Certificate Transparency project fixes several structural flaws in the SSL certificate system, which is the main cryptographic system that underlies all HTTPS connections.
Read the rest of CTFR – Abuse Certificate Transparency Logs For HTTPS Subdomains now! Only available at Darknet.
-
-
7:17
»
Darknet

CHIPSEC is a platform security assessment framework for PCs including hardware, system firmware (BIOS/UEFI), and platform components for firmware hacking.
It includes a security test suite, tools for accessing various low-level interfaces, and forensic capabilities. It can be run on Windows, Linux, Mac OS X and UEFI shell.
You can use CHIPSEC to find vulnerabilities in firmware, hypervisors and hardware configuration, explore low-level system assets and even detect firmware implants.
Read the rest of CHIPSEC – Platform Security Assessment Framework For Firmware Hacking now! Only available at Darknet.
-
-
8:17
»
Darknet

HTTrack is a free and easy-to-use offline browser utility which acts as a website downloader and a site ripper for copying websites and downloading them for offline viewing.
HTTrack Website Downloader & Site Ripper
HTTrack allows you to download a World Wide Web site from the Internet to a local directory, building recursively all directories, getting all the HTML, images, and other files from the server to your computer.
HTTrack arranges the original site’s relative link-structure, which allows you to simply open a page of the “mirrored” website in your browser, and you can browse the site from link to link as if you were viewing it online.
Read the rest of HTTrack – Website Downloader Copier & Site Ripper Download now! Only available at Darknet.
-
-
3:12
»
Darknet

sshLooter is a Python script using a PAM module to steal SSH passwords by logging the password and notifying the admin of the script via Telegram when a user logs in rather than via strace which is not so reliable.
It also comes with an installation script install.sh to install all dependencies on a target host machine.
ssHLooter was inspired to steal SSH passwords via another script using Python to implement a PAM module to log failed attempts, the author just had to change the location where passwords were logged.
Read the rest of sshLooter – Script To Steal SSH Passwords now! Only available at Darknet.
-
-
23:09
»
Darknet

Intercepter-NG is a multi functional network toolkit including an Android app for hacking, the main purpose is to recover interesting data from the network stream and perform different kinds of MiTM attacks.
Specifically referring to Intercepter-NG Console Edition which works on a range of systems including NT, Linux, BSD, MacOSX, IOS and Android.
The Windows version is the one with the most powerful feature-set, but the Android app is fairly handy too.
Read the rest of Intercepter-NG – Android App For Hacking now! Only available at Darknet.
-
-
0:49
»
Darknet

dcipher is a JavaScript-based online hash cracking tool to decipher hashes using online rainbow & lookup table attack services.
The capacity to programmatically crack passwords is also a function of the number of possible passwords per second which can be checked. If a hash of the target password is available to the attacker, this number can be in the billions or trillions per second, since an offline attack is possible.
In this case dcipher uses online hash checking services, which have extremely large Rainbow Table sets of pre-computed hashes, to rapidly find hash collisions.
Read the rest of dcipher – Online Hash Cracking Using Rainbow & Lookup Tables now! Only available at Darknet.
-
-
2:30
»
Darknet

Cangibrina is a Python-based multi platform admin dashboard finder tool which aims to obtain the location of website dashboards by using brute-force, wordlists, Google, Nmap and robots.txt.
It is multi-threaded, supports modifying your user agent, using a TOR proxy, custom dorks, Nmap integration and can use both DuckDuckGo and Google.
Cangibrina Admin Dashboard Finder Requirements
- Python 2.7
- mechanize
- PySocks
- beautifulsoup4
- html5lib
- Nmap
- TOR
Cangibrina Usage to Find Admin Dashboards
usage: cangibrina.py [-h] -u U [-w W] [-t T] [-v] [--ext EXT] [--user-agent]
[--tor] [--search] [--dork DORK] [--nmap [NMAP]]
Fast and powerful admin finder
optional arguments:
-h, --help show this help message and exit
-u U target site
-w W set wordlist (default: wl_medium)
-t T set threads number (default: 5)
-v enable verbose
--ext EXT filter path by target extension
--user-agent modify user-agent
--sub-domain search for sub domains instead of directories
--tor set TOR proxy
--search use google and duckduckgo to search
--dork DORK set custom dork
--nmap [NMAP] use nmap to scan ports and services
There are other specific tools in this area like WPScan for WordPress and DruPwn for Drupal – and in those cases the dashboard URLs are already known.
Read the rest of Cangibrina – Admin Dashboard Finder Tool now! Only available at Darknet.
-
-
9:08
»
Darknet

Enumall is a Python-based tool that helps you do subdomain discovery using only one command by combining the abilities of Recon-ng and AltDNS.
This gives you the ability to run multiple domains within the same session. The tool only has one module that needs an API key (/api/google_site) find instructions for that on the recon-ng wiki.
Setting up Enumall for Subdomain Discovery
Install recon-ng from Source, clone the Recon-ng repository:
git clone https://LaNMaSteR53@bitbucket.org/LaNMaSteR53/recon-ng.git
Change into the Recon-ng directory:
cd recon-ng
Install dependencies:
pip install -r REQUIREMENTS
Link the installation directory to /usr/share/recon-ng
ln -s /$recon-ng_path /usr/share/recon-ng
Optionally (highly recommended) download:
– AltDNS
– A good subdomain bruteforce list (example here)
Create the config.py file and specify the path to Recon-ng and AltDNS as it showed in config_sample.py.
Read the rest of Enumall – Subdomain Discovery Using Recon-ng & AltDNS now! Only available at Darknet.
-
-
2:25
»
Darknet

RidRelay is a Python-based tool to enumerate usernames on a domain where you have no credentials by using a SMB Relay Attack with low privileges.
How RidRelay SMB Relay Attack Works
RidRelay combines the SMB Relay attack, common lsarpc based queries and RID cycling to get a list of domain usernames. It takes these steps:
- Spins up an SMB server and waits for an incoming SMB connection
- The incoming credentials are relayed to a specified target, creating a connection with the context of the relayed user
- Queries are made down the SMB connection to the lsarpc pipe to get the list of domain usernames.
Read the rest of RidRelay – SMB Relay Attack For Username Enumeration now! Only available at Darknet.
-
-
12:11
»
Darknet

NetBScanner is a NetBIOS network scanner tool that scans all computers in the IP addresses range you choose, using the NetBIOS protocol.
For every computer located by this NetBIOS scanner, the following information is displayed:
- IP Address
- Computer Name
- Workgroup or Domain
- MAC Address
- Network adapter manufacturer (from MAC address).
NetBScanner also shows whether a computer is a Master Browser.
Read the rest of NetBScanner – NetBIOS Network Scanner now! Only available at Darknet.
-
-
0:30
»
Darknet

Powershell-RAT is a Python-based Gmail exfiltration RAT that can be used a Windows backdoor to send screenshots or other data as an e-mail attachment.
This RAT will help you during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends the information to an attacker as an e-mail attachment.
It claims to not need Administrator access and is not currently detected by Anti-virus software.
Read the rest of Powershell-RAT – Gmail Exfiltration RAT now! Only available at Darknet.
-
-
8:34
»
Darknet

Airgeddon is a Bash powered multi-use Wireless Security Auditing Script for Linux systems with an extremely extensive feature list.
Airgeddon Wireless Security Auditing Features
- Interface mode switcher (Monitor-Managed) keeping selection even on interface name changing
- DoS over wireless networks using different methods. “DoS Pursuit mode” available to avoid AP channel hopping (available also on DoS performed on Evil Twin attacks)
- Full support for 2.4Ghz and 5Ghz band
- Assisted Handshake file capturing
- Cleaning and optimizing Handshake captured files
- Offline password decrypting on WPA/WPA2 captured files (dictionary, bruteforce and rule based) based on aircrack, crunch and hashcat tools.
Read the rest of airgeddon – Wireless Security Auditing Script now! Only available at Darknet.
-
-
15:03
»
Darknet

CloudFrunt is a Python-based tool for identifying misconfigured CloudFront domains, it uses DNS and looks for CNAMEs which may be allowed to be associated with CloudFront distributions. This effectively allows for domain hijacking.
How CloudFrunt Works For Misconfigured CloudFront
CloudFront is a Content Delivery Network (CDN) provided by Amazon Web Services (AWS). CloudFront users create “distributions” that serve content from specific sources (an S3 bucket, for example).
Each CloudFront distribution has a unique endpoint for users to point their DNS records to (ex.
Read the rest of CloudFrunt – Identify Misconfigured CloudFront Domains now! Only available at Darknet.
-
-
3:25
»
Darknet

Airbash is a POSIX-compliant, fully automated WPA PSK handshake capture script aimed at penetration testing. It is compatible with Bash and Android Shell (tested on Kali Linux and Cyanogenmod 10.2) and uses aircrack-ng to scan for clients that are currently connected to access points (AP).
Those clients are then deauthenticated in order to capture the handshake when attempting to reconnect to the AP. Verification of a captured handshake is done using aircrack-ng.
Read the rest of Airbash – Fully Automated WPA PSK Handshake Capture Script now! Only available at Darknet.
-
-
2:13
»
Darknet

XXEinjector is a Ruby-based XXE Injection Tool that automates retrieving files using direct and out of band methods. Directory listing only works in Java applications and the brute forcing method needs to be used for other applications.
Usage of XXEinjector XXE Injection Tool
XXEinjector actually has a LOT of options, so do have a look through to see how you can best leverage this type of attack. Obviously Ruby is a prequisite to run the tool.
Read the rest of XXEinjector – Automatic XXE Injection Tool For Exploitation now! Only available at Darknet.
-
-
9:51
»
Darknet

Ah Yahoo! in trouble again, this time the news is Yahoo! fined for 35 million USD by the SEC for the 2 years delayed disclosure of the massive hack, we actually reported on the incident in 2016 when it became public – Massive Yahoo Hack – 500 Million Accounts Compromised.
Yahoo! has been having a rocky time for quite a few years now and just recently has sold Flickr to SmugMug for an undisclosed amount, I hope that at least helps pay off some of the fine.
Read the rest of Yahoo! Fined 35 Million USD For Late Disclosure Of Hack now! Only available at Darknet.
-
-
8:36
»
Darknet

Drupwn is a Python-based Drupal Enumeration Tool that also includes an exploit mode, which can check for and exploit relevant CVEs.
Drupwn Drupal Enumeration Tool Hacking Features
Drupwn can be run, using two separate modes which are enum and exploit. The enum mode allows performing enumerations whereas the exploit mode allows checking and exploiting CVEs.
Enum mode
- User enumeration
- Node enumeration
- Default files enumeration
- Module enumeration
- Theme enumeration
- Cookies support
- User-Agent support
- Basic authentication support
- Request delay
- Enumeration range
- Logging
Exploit mode
- Vulnerability checker
- CVE exploiter
For scanning Drupal sites there is also:
– Droopescan – Plugin Based CMS Security Scanner
You can download Drupwn here:
drupwn-master.zip
Or read more here.
Read the rest of Drupwn – Drupal Enumeration Tool & Security Scanner now! Only available at Darknet.
-
-
11:31
»
Darknet

Big news in the crypto scene this week was that the MyEtherWallet DNS Hack that occured managed to collect about $17 Million USD worth of Ethereum in just a few hours.
The hack itself could have been MUCH bigger as it actually involved compromising 1300 Amazon AWS Route 53 DNS IP addresses, fortunately though only MEW was targetted resulting in the damage being contained in the cryptosphere (as far as we know anyway).
Read the rest of MyEtherWallet DNS Hack Causes 17 Million USD User Loss now! Only available at Darknet.
-
-
10:08
»
Darknet

StaCoAn is a cross-platform tool which aids developers, bug bounty hunters and ethical hackers performing mobile app static analysis on the code of the application for both native Android and iOS applications.
This tool will look for interesting lines in the code which can contain:
- Hardcoded credentials
- API keys
- URL’s of API’s
- Decryption keys
- Major coding mistakes
This tool was created with a big focus on usability and graphical guidance in the user interface.
Read the rest of StaCoAn – Mobile App Static Analysis Tool now! Only available at Darknet.
-
-
10:48
»
Darknet

snallygaster is a Python-based tool that can help you to scan for secret files on HTTP servers, files that are accessible that shouldn’t be public and can pose a security risk.
Typical examples include publicly accessible git repositories, backup files potentially containing passwords or database dumps. In addition it contains a few checks for other security vulnerabilities.
snallygaster HTTP Secret File Scanner Features
This is an overview of the tests provided by snallygaster.
Read the rest of snallygaster – Scan For Secret Files On HTTP Servers now! Only available at Darknet.
-
-
8:34
»
Darknet

One of the biggest stories of the year so far has been the scandal surrounding Cambridge Analytica that came out after a Channel 4 expose that demonstrated the depths they are willing to go to profile voters, manipulate elections and much more.
It’s kicking off in the UK and the US and Mark Zuckerberg has had to come out publically and apologise about the involvement of Facebook.
This goes deep with ties to elections and political activities in Malaysia, Mexico, Brazil, Australia and Kenya.
Read the rest of Cambridge Analytica Facebook Data Scandal now! Only available at Darknet.
-
-
1:19
»
Darknet

GetAltName it’s a little script to discover sub-domains that can extract Subject Alt Names for SSL Certificates directly from HTTPS websites which can provide you with DNS names or virtual servers.
It’s useful in a discovery phase of a pen-testing assessment, this tool can provide you with more information about your target and scope.
Features of GetAltName to Discover Sub-Domains
- Strips wildcards and www’s
- Returns a unique list (no duplicates)
- Works on verified and self-signed certs
- Domain matching system
- Filtering for main domains and TLDs
- Gets additional sub-domains from crt.sh
- Outputs to clipboard
GetAltName Subdomain Exctraction Tool Usage
You can output to a text file and also copy the output to your clipboard as a List or a Single line string, which is useful if you’re trying to make a quick scan with Nmap or other tools.
Read the rest of GetAltName – Discover Sub-Domains From SSL Certificates now! Only available at Darknet.
-
-
7:32
»
Darknet

Memcrashed is a Memcached DDoS exploit tool written in Python that allows you to send forged UDP packets to a list of Memcached servers obtained from Shodan.
This is related to the recent record-breaking Memcached DDoS attacks that are likely to plague 2018 with over 100,000 vulnerable Memcached servers showing up in Shodan.
What is Memcached?
Memcached is an in-memory key-value store for small chunks of arbitrary data (strings, objects) from results of database calls, API calls, or page rendering.
Read the rest of Memcrashed – Memcached DDoS Exploit Tool now! Only available at Darknet.
-
-
10:33
»
Darknet

So after the massive DDoS attack trend in 2016 it seems like 2018 is going to the year of the Memcached DDoS amplification attack with so many insecure Memcached servers available on the public Internet.
Unfortunately, it looks like a problem that won’t easily go away as there are so many publically exposed, poorly configured Memcached servers online (estimated to be over 100,000).
Honestly, Github handled the 1.3Tbps attack like a champ with only 10 minutes downtime although they did deflect it by moving traffic to Akamai.
Read the rest of Memcached DDoS Attacks Will Be BIG In 2018 now! Only available at Darknet.
-
-
7:49
»
Darknet

XSStrike is an advanced XSS detection suite, which contains a powerful XSS fuzzer and provides zero false positive results using fuzzy matching. XSStrike is the first XSS scanner to generate its own payloads.
It is also built in an intelligent enough manner to detect and break out of various contexts.
Features of XSStrike XSS Fuzzer & Hacking Tool
XSStrike has:
- Powerful fuzzing engine
- Context breaking technology
- Intelligent payload generation
- GET & POST method support
- Cookie Support
- WAF Fingerprinting
- Handcrafted payloads for filter and WAF evasion
- Hidden parameter discovery
- Accurate results via levenshtein distance algorithm
There are various other XSS security related tools you can check out like:
– XSSYA v2.0 Released – XSS Vulnerability Confirmation Tool
– xssless – An Automated XSS Payload Generator Written In Python
– XSSer v1.0 – Cross Site Scripter Framework
You can download XSStrike here:
XSStrike-master.zip
Or read more here.
Read the rest of XSStrike – Advanced XSS Fuzzer & Exploitation Suite now! Only available at Darknet.
-
-
12:53
»
Darknet

Quickjack is an intuitive, point-and-click tool for performing advanced and covert clickjacking and frame slicing attacks. It also allows you to easily perform clickjacking, or steal “clicks” from users on many websites, forcing the user to unknowingly click buttons or links (for example the Facebook Like button) using their own cookies.
Quickjack By placing the auto-generated code on any site, you can obtain thousands of clicks quickly from different users, or perform targeted attacks by luring a victim to a specific URL.
Read the rest of Quickjack – Advanced Clickjacking & Frame Slicing Attack Tool now! Only available at Darknet.
-
-
1:59
»
Darknet

BootStomp is a Python-based tool, with Docker support that helps you find two different classes of Android bootloader vulnerabilities and bugs. It looks for memory corruption and state storage vulnerabilities.
Note that BootStomp works with boot-loaders compiled for ARM architectures (32 and 64 bits both) and that results might slightly vary depending on angr and Z3’s versions. This is because of the time angr takes to analyze basic blocks and to Z3’s expression concretization results.
Read the rest of BootStomp – Find Android Bootloader Vulnerabilities now! Only available at Darknet.
-
-
9:07
»
Darknet

Altdns is a Subdomain Recon Tool in Python that allows for the discovery of subdomains that conform to patterns. The tool takes in words that could be present in subdomains under a domain (such as test, dev, staging) as well as takes in a list of subdomains that you know of.
From these two lists that are provided as input to altdns, the tool then generates a massive output of “altered” or “mutated” potential subdomains that could be present.
Read the rest of altdns – Subdomain Recon Tool With Permutation Generation now! Only available at Darknet.
-
-
3:54
»
Darknet

So another 0-Day Flash Vulnerability is being exploited in the Wild, a previously unknown flaw which has been labelled CVE-2018-4878 and it affects 28.0.0.137 and earlier versions for both Windows and Mac (the desktop runtime) and for basically everything in the Chrome Flash Player (Windows, Mac, Linux and Chrome OS).
The full Adobe Security Advisory can be found here:
– Security Advisory for Flash Player | APSA18-01
Adobe warned on Thursday that attackers are exploiting a previously unknown security hole in its Flash Player software to break into Microsoft Windows computers.
Read the rest of 0-Day Flash Vulnerability Exploited In The Wild now! Only available at Darknet.
-
-
6:01
»
Hack a Day
If you’re lacking useful equipment for your Raspberry Pi hacking adventure, such as an HDMI monitor or power supply, this handy write-up will show you how to continue your hacking. All you’ll need is a laptop, the Raspberry Pi itself, an SD card, and an Ethernet and micro-USB cable. As noted in the article, it’s [...]
-
-
14:01
»
Hack a Day
This arm cuff is a sensor package which logs data whenever you’re wearing it. It records accelerometer data, skin temperature, and galvanic skin response. That data can then be analyzed to arrive at figures like calories burned. But… The company behind the device seems to have included a way to keep the cash flowing. Once [...]
-
-
22:53
»
SecDocs
-
-
21:47
»
SecDocs
Authors:
Nils Magnus Tags:
penetration testing Event:
Chaos Communication Congress 19th (19C3) 2002 Abstract: Hacking used to be an art; one may get the impression that this turned recently in other questions of, say how many toolz you have and which systems you own. Within our presentation we will demonstrate hacking approaches with little or even no tools at all. Given a reasonable number of standard operating system utilities, much information about a network can be obtained and several hacks deem possible. This is no presenation of cutting-edge techniques, most of the approaches have been possible since many years/for a long time. However, we will not explain what TCP/IP means or how to calculate a netmask. Targetetd to an audience that knows what networking is all about but wishes to see more obfruscated means of using well-known utilities. During the hands-on session we will explain and demonstrate how we can draw maps of segments with traceroute, how to identify filtered hosts with ping and arp, how to do IP spoofing and segment invasion with ifconfig or how to get some more reliable information about a webserver. We conclude with a discussion of the feasibility of this approach, identify useful tools that can be of effective help and name those which mainly keep you stupid whilst they do not do any better.
-
-
21:55
»
SecDocs
Authors:
Nils Magnus Tags:
penetration testing Event:
Chaos Communication Congress 19th (19C3) 2002 Abstract: Hacking used to be an art; one may get the impression that this turned recently in other questions of, say how many toolz you have and which systems you own. Within our presentation we will demonstrate hacking approaches with little or even no tools at all. Given a reasonable number of standard operating system utilities, much information about a network can be obtained and several hacks deem possible. This is no presenation of cutting-edge techniques, most of the approaches have been possible since many years/for a long time. However, we will not explain what TCP/IP means or how to calculate a netmask. Targetetd to an audience that knows what networking is all about but wishes to see more obfruscated means of using well-known utilities. During the hands-on session we will explain and demonstrate how we can draw maps of segments with traceroute, how to identify filtered hosts with ping and arp, how to do IP spoofing and segment invasion with ifconfig or how to get some more reliable information about a webserver. We conclude with a discussion of the feasibility of this approach, identify useful tools that can be of effective help and name those which mainly keep you stupid whilst they do not do any better.
-
12:01
»
Hack a Day
We see [Ben Grosser's] point that all the metrics found on the Facebook user interface make the experience somewhat of a game to see if you can better your high score. He thinks this detracts from the mission of having social interactions that themselves have a value. So he set out to remove the ‘scores’ from [...]
-
-
5:01
»
Hack a Day
Although beer is generally a good way to get people to come to your trade show booth, [Robofun.ru] decided to put a new spin on things. Instead of (or possibly in addition to) giving out beer, they decided to turn 40 Staropramen beer cans into a keyboard. This was done using an Arduino hooked up [...]
-
-
9:41
»
SecDocs
Authors:
Stefan Arentz Tags:
embedded Linux Event:
Chaos Communication Congress 21th (21C3) 2004 Abstract: More and more devices like wireless access points, personal network storage servers or satellite decoders are powered by Linux. Some vendors are even publicly distributing the (base) source code for their products. This session will show the details of embedded Linux and how you can change these devices to your own needs.
-
-
12:01
»
Hack a Day
Knowing that I’m always happy to get something new and glowy, my wife brought home a cheap “floating pool light” that she found on sale for roughly $10. This is a large white floating ball that has LEDs inside and cycles through different colors. Meant to be put into a pool for neat effects, we [...]
-
-
7:00
»
Hack a Day
[Lou] sent in this amazingly simple hack that has been saving him money on special batteries for his dog collar. He uses an invisible fence system which gives the dog a shock if it passes beyond certain markers in his yard. The collars use special batteries so you’re not strapping multiple full sized cells to [...]
-
-
9:01
»
Hack a Day
Summer is winding down, which means that sales will be beginning on grills at stores all over the place. For those that enjoy the outdoor cooking experience, a nice new grill is always tempting. If you’re anything like me though, it can be hard to justify the expense. All you need is some fire right? [...]
-
-
21:50
»
SecDocs
Authors:
Ilya V. Vasilyev Tags:
hacking Event:
Chaos Communication Camp 2007 Abstract: At the beginning of 90s Soviet (now Russian) hackerdom begin to experience same problems, as everywhere. Journalists became to blame computer fandom in virtually every crime they could imagine. At 1996, I have found just another solution by opening the School of Hacking Art very like karate-do Schools. In Germany there was TV Show "Die Hackerschule. Galileo. ProSieben. November, 13, 2000, 19:30 about the School. Also here is something in German, check it: http://web.archive.org/web/20050218210212/hscool.net/about/article2.html The event will be a free-style seminar. The basic idea: What have already been done, what should be done. The history of hacking education, relations/communications with government, business, media, etc. Strength and weakness of this way. Some examples of educational technologies from Russia, that are helpful to the whole underground. Q&A session.
-
21:50
»
SecDocs
Authors:
Ilya V. Vasilyev Tags:
hacking Event:
Chaos Communication Camp 2007 Abstract: At the beginning of 90s Soviet (now Russian) hackerdom begin to experience same problems, as everywhere. Journalists became to blame computer fandom in virtually every crime they could imagine. At 1996, I have found just another solution by opening the School of Hacking Art very like karate-do Schools. In Germany there was TV Show "Die Hackerschule. Galileo. ProSieben. November, 13, 2000, 19:30 about the School. Also here is something in German, check it: http://web.archive.org/web/20050218210212/hscool.net/about/article2.html The event will be a free-style seminar. The basic idea: What have already been done, what should be done. The history of hacking education, relations/communications with government, business, media, etc. Strength and weakness of this way. Some examples of educational technologies from Russia, that are helpful to the whole underground. Q&A session.
-
13:24
»
SecDocs
Authors:
Gadi Evron Tags:
hacking Event:
Chaos Communication Camp 2007 Abstract: In this lecture we will discuss how security issues may impact the future, which may be confused with science fiction. Already today we find cyber-implants of different kinds embedded within the human machine. As security professionals we know there is no such things as perfect code, and security solutions are far from perfect. What will we be facing in 2040, and how might we defend ourselves - if at all.
-
-
6:00
»
Hack a Day
As [Brad] over at the LVL1 hackerspace watched his friend build a Laser tag/tazer mashup for Makerfaire Detroit 2012, he noticed these new laser tag guns were really cool. These Light Strike guns have an impressive array of electronics for a $30 toy, but there was still much to be desired. [Brad] decided to reverse engineer [...]
-
-
13:01
»
Hack a Day
You can do some neat stuff to the way your Ford Focus Mk2 works, but first you have to gain access to the data system. If you know some Russian, and don’t mind a bit of dongle rewiring, this guide will have you hacking the car’s CAN bus in no time. It was written by [...]
-
8:01
»
Hack a Day
Years and years ago, someone gave me this book as a gift. [John Knittel], a co-author thought I might find it amusing. The book, titled The Dangers of Computer Hacking, is a grade school level breakdown of, well, computer hacking and the dangers thereof. At the time, I thought it was rather fun and amusing. [...]
-
-
21:47
»
SecDocs
Tags:
hacking Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: It is thought by many that the world may be facing Peaks in fossil fuel production and catastrophic climate change. These huge problems put into question the Industrial Civilisation and call for, at the very least, massive changes to society if humanity is to survive. Do hackers have a role to play in a post transition society? What sort of things should hackers know and prepare for in such a future?
-
21:47
»
SecDocs
Tags:
hacking Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: It is thought by many that the world may be facing Peaks in fossil fuel production and catastrophic climate change. These huge problems put into question the Industrial Civilisation and call for, at the very least, massive changes to society if humanity is to survive. Do hackers have a role to play in a post transition society? What sort of things should hackers know and prepare for in such a future?
-
-
21:56
»
SecDocs
Tags:
hacking Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: The Open Source initiative re-interpreted Free Software to include it into the neo-liberal ideology and the capitalist economy - whose aims are contrary to the FS starting axioms/freedoms. This platform will focus on ideological and political aspects of this. It will also suggest FS recovery strategies.
-
-
21:44
»
SecDocs
Authors:
Peter Fuhrmann Tags:
games Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: The C64-DTV is a remake of the classic homecomputer sold as a joystick-contained videogame. The talk gives an overview about the structure of the DTV, and shows different hardware and software modifications that can be done.
-
-
21:57
»
SecDocs
Authors:
Alessio L. R. Pennasilico Raoul Chiesa Tags:
SCADA Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: SCADA acronym stand for “Supervisory Control And Data Acquisition”, and it's related to industrial automation inside critical infrastructures. This talk will introduce the audience to SCADA environments and its totally different security approaches, outlining the main key differences with typical IT Security best practices. We will analyze a real world case study related to industry. We will describe the most common security mistakes and some of the direct consequences of such mistakes to a production environment. In addition, attendees will be shown a video of real SCADA machines reacting to these attacks in the most “interesting” of ways! :)
-
-
11:01
»
Hack a Day
Unfortunately the result of hacking together two shop vacuums isn’t a double-power monstrosity. This is actually the story of combining broken and substandard parts into one usable machine. The guys at the Shackspace originally bought a cheap shop vacuum whose motor gave up the ghost way too quickly. The replacement had only a tiny container for [...]
-
-
21:28
»
SecDocs
Tags:
hacking Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: What do hackers have in common with crafters? Lots. While crafting is more often about string and glue than bits and electrons, crafters often feel the same need to create things and manipulate materials into something new. The roots of computing are intertwined with craft around the invention of the Jaquard punchcard loom. We'll look at where the two scenes have gone since then, and what we can gain by reconnecting the hacker world with its softer, more decorative cousin.
-
-
10:01
»
Hack a Day
[Dave] loved his iPod nano so much that he implanted 4 magnets in his arm to hold it. Ok, go ahead and shout “fanboy” at your screen and say something snide about apples products or lament the poor working conditions at foxconn. Got it out of your system? Cool. Actually, if we had to guess, [...]
-
-
13:17
»
Hack a Day
[Andrew] got his hands on a Kingston Wi-Drive, and being the responsible Hackaday reader he is, spent the better part of a weekend figuring out how to get root on this shiny new toy The Kingston Wi-Drive is a small battery-powered Flash drive with a wi-fi adapter in a small, compact case. Even though Kingston is going [...]
-
-
12:01
»
Hack a Day
We’ve seen a few different versions of the “trampofoil” before. That’s the contraption that utilizes a hydrofoil and human power to scoot you across the water above the surface. It is somewhat difficult to explain, so just check out the first video after the break to see how the original works. Today, we stumbled upon [...]
-
-
13:36
»
Hack a Day
[Troy] recently got his hands on a greengoose starter kit and like any HAD reader would do, proceeded to probe it mercilessly. The greengoose appears to be some sort of location-tracking device which reports back to a server on the position and location of radio transmitters relative to it. [Troy] managed to not only get [...]
-
-
12:01
»
Hack a Day
[BadWolf's] girlfriend wanted him to build her a lamp for Christmas and he didn’t disappoint. What he came up with is a water-filled color changing lamp with bubbles for added interest. See for yourself in the clip after the jump. The color changing properties are easily taken care of by some waterproof RGB LED strips. [...]
-
11:36
»
Hack a Day
[Karl] needed a programmable real-time clock for one of his projects. He considered adding an RTC chip, LCD screen, and some buttons for use with a microcontroller. That’s not necessarily hard, but it takes time and can be considered a project in itself. Instead, he headed to the hardware store to look for a cheap [...]
-
12:01
»
Hack a Day
[Arnuschky] was looking for a network storage solution that included redundancy. He could have gone with a new NAS box, but didn’t want to shell out full price. Instead, he picked up a Dell PowerEdge 2800 and hacked it for SATA drives and quiet operation. It’s not surprising that this hardware can be had second-hand [...]
-
-
8:09
»
Packet Storm Security Recent Files
Whitepaper called Hacking Dispositivos iOS. It demonstrates how dangerous it is to be connected to a wireless network with an iOS device that has OpenSSH enabled. Written in Spanish.
-
8:09
»
Packet Storm Security Misc. Files
Whitepaper called Hacking Dispositivos iOS. It demonstrates how dangerous it is to be connected to a wireless network with an iOS device that has OpenSSH enabled. Written in Spanish.
-
-
20:09
»
Packet Storm Security Recent Files
StoryBoard Quick version 6 suffers from a file format stack buffer overflow. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. Included in this archive are the advisory, a proof of concept and a Metasploit module.
-
17:46
»
Packet Storm Security Recent Files
These are the slides from the Hacking Hollywood presentation given at Ruxcon 2011. It documents vulnerabilities that the researcher discovered in various pieces of software in use by large Hollywood studios. Be sure to check out the related files for this presentation as there are multiple proof of concept exploits and advisories.
-
17:46
»
Packet Storm Security Misc. Files
These are the slides from the Hacking Hollywood presentation given at Ruxcon 2011. It documents vulnerabilities that the researcher discovered in various pieces of software in use by large Hollywood studios. Be sure to check out the related files for this presentation as there are multiple proof of concept exploits and advisories.
-
-
10:01
»
Hack a Day
This food sealer just wasn’t cutting it for [Tinkering Engineer], so he decided to do something about it. The issue with this sealer was that it didn’t have a mode where it could simply seal bags without pulling a vacuum on it. Going through the whole process takes a reported 40 seconds in order to [...]
-
5:10
»
Hack a Day
Hackaday reader [Kieran] volunteers at an outdoor haunted house attraction called the “Disenchanted Forest”. Attendees are lead through the haunted forest by a volunteer, who helps keep everyone on the predetermined trail. The trail is usually lit by small LED fixtures that the group constructed, but the organizers wanted to make the lights more interactive [...]
-
-
11:01
»
Hack a Day
[Bill Zimmerman] is in Cameroon and has been posting some really interesting articles about life in the central African nation. It comes as no surprise that imported goods can be prohibitively expensive for many of the country’s residents, so building tools and goods is way to improve life and save money. The image above is [...]
-
10:04
»
Hack a Day
[Steve] has an older third generation VW Golf, and as those who have owned one surely know, the beloved VR6 engine is wonderful but finicky. He says that the VR6 is particularly picky when it comes to oil temperature, so his daily routine involves hitting the MFA switch five times upon starting his car to [...]
-
-
14:45
»
Hack a Day
Provided you haven’t been toiling away in a secret lair somewhere (we’re looking at you [Jack]), odds are you may have seen the news that [Steve Jobs] stepped down as CEO of Apple this past Wednesday. This earth-shattering news even eclipsed that of the East Coast Megaquakeapocalypse. It sent the blogosphere into a tizzy, [...]
-
4:04
»
Hack a Day
[Roofus] had an older car, and unfortunately his stereo’s cassette player just wasn’t doing it for him. He always wanted to simply get into his car, pull out his cell phone, and have his music ready to play without any fuss. After messing around with all sorts of different tape adapters, he got fed up [...]
-
-
8:06
»
Hack a Day
QR codes are everywhere these days, from being printed onto receipts to chiseled into granite tombstones. [Will] came up with a way to modify existing QR codes, and his hack has the potential to cause quite a bit of harmless mischief. [Will]‘s hack involves a little photo editing, transparency film, and some white-out/Liquid Paper/Tippex. After the ‘target’ [...]
-
-
15:56
»
Packet Storm Security Recent Files
This file contains slides for the "Hacking IPv6 Networks" training provided at Hack in Paris 2011. They contain quite a few insights about IPv6 security, along with a number of practical examples.
-
15:56
»
Packet Storm Security Misc. Files
This file contains slides for the "Hacking IPv6 Networks" training provided at Hack in Paris 2011. They contain quite a few insights about IPv6 security, along with a number of practical examples.
-
-
15:30
»
Hack a Day
For a while now I have been battling a dying 2.6Ghz dual core computer, but due to laziness and budget I just let it ride. At first it would occasionally crash in games, then it got to where it would crash during routine activities. After a year of this it would nail 105 degrees C [...]
-
-
3:50
»
Hack a Day
[Josh Wright] wrote in with a handy little hack just in time for today’s release of Mac OSX Lion. If you’re not familiar with the new version of the OS, Apple has decided to change things up this time around, completely eliminating physical distribution media. In the event that you need to run a factory [...]
-
-
8:38
»
Carnal0wnage
SynJunkie has a couple good posts on citrix escapes:
http://synjunkie.blogspot.com/search/label/Citrixand of course iKat
http://ikat.ha.cked.net/So recently I had to break out of restricted citrix environment. All I had was Excel 2010 and Word 2010.
I also didnt have a fancy "jump to url" option when I clicked on the title bar and none of the hot keys were working for me. So goal was to get a web broswer or cmd shell.
I was able to create macros though. So first I added the developers ribbon.

Click the visual basic button, and paste in some sweet macro code.


Then you save the file as macro enabled workbook.

Once its saved, you can hit the macro button and run your macro.

and get shell

** To be clear all of this is running remotely on the citrix host.**
The macro code
Sub GETSHELL()
'execute EXE file
Shell "CMD /K C:\windows\system32\cmd.exe", vbNormalFocus
End Sub
You could also just type a url into excel...

and click it..But that's pretty low tech and not much fun :-)

Again this IE browser is running remotely on the citrix host. From here you can client-side exploit yourself...i.e. java applet exloit... to get your outbound shell.
-
-
13:01
»
Hack a Day
A few weeks back we ran a piece about the convergence of making and baking in an attempt to create a cake festooned with working LEDs. The moral was that not every creative idea ends in victory, but we applauded the spirit it takes to post one’s goofs for the whole internet to see and [...]
-
-
10:12
»
Hack a Day
[Arto] recently upgraded his home Internet subscription from an ADSL to VDSL, and with that change received a shiny new ZTE ZXDSL 931WII modem/wireless router. Once he had it installed, he started to go about his normal routine of changing the administrator password, setting up port forwarding, and configuring the wireless security settings…or at least [...]