«
Expand/Collapse
30 items tagged "someone"
Related tags:
Newbie [+],
Area [+],
password [+],
BackTrack [+],
wep [+],
network hack [+],
national [+],
mike [+],
feture [+],
co workers [+],
clicks [+],
buzz [+],
alot [+],
Idiots [+],
Corner [+],
xbee [+],
wpa wpa2 [+],
wpa [+],
world alot [+],
wooden propeller [+],
wireless extension [+],
way [+],
wallet [+],
wall street [+],
volume 1 [+],
video [+],
victim machine [+],
unwanted visitors [+],
type [+],
turn key solution [+],
transportation [+],
transformer based [+],
toy [+],
time [+],
thousands of dollars [+],
third party software [+],
teach [+],
target [+],
sql server [+],
sql security [+],
sql [+],
speed dial [+],
sp3 [+],
social engineering [+],
sniffer [+],
setup [+],
sensors [+],
security system [+],
security [+],
school [+],
sangean [+],
rfid [+],
repair [+],
rapid attack [+],
random color [+],
radio [+],
psu [+],
proper noun [+],
port [+],
pirate ship [+],
ping pong [+],
phone [+],
pc [+],
paul [+],
password lists [+],
orload [+],
odbc connections [+],
odbc [+],
octocopter [+],
noobish [+],
nokia cellphone [+],
nokia [+],
news [+],
newby [+],
network gateway [+],
motorcycle engines [+],
motion sensor [+],
microsoft [+],
metasploit [+],
martin [+],
looks [+],
led [+],
joe [+],
jim [+],
jeri [+],
iso [+],
ip telephone [+],
interface [+],
infiltrator [+],
host [+],
home [+],
hey guys [+],
hd radio [+],
hackerspace [+],
hacker [+],
grift [+],
gauntlet [+],
game [+],
framework [+],
fingertips [+],
exploits [+],
exchange server [+],
everyday devices [+],
error type [+],
error [+],
dress [+],
dr. boardman [+],
doctor wily [+],
disney dollars [+],
design mistakes [+],
debbi [+],
database [+],
cooperative game [+],
conundrum [+],
color [+],
clue [+],
classic [+],
chris [+],
chinese hacker [+],
cellphones [+],
cards [+],
card [+],
cannon balls [+],
call [+],
button [+],
bt3 [+],
box [+],
blog [+],
bill porter [+],
betting man [+],
barcode [+],
barbot [+],
arp [+],
arduino [+],
arcades [+],
algorithm [+],
afar [+],
adrian [+],
adam [+],
Wireless [+],
Pentesting [+],
Hackerspaces [+],
General [+],
Discussion [+],
hacks [+]
-
-
5:01
»
Hack a Day
We just got a tip from [PT] that a seven part series on how to start a Hackerspace will be posted this week. The blog over at Adafruit will be publishing one installment a day. Right now the introduction (linked above) and volume 1 are available. This covers what a Hackerspace is and who you [...]
-
-
12:01
»
Hack a Day
RFID hacking has been around for years, but so far all the builds to sniff data out of someone’s wallet have been too large, too small a range, or were much too complicated for a random Joe to build in his workshop. [Adam]‘s RFID sniffer gets around all those problems, and provides yet another reason to [...]
-
-
1:14
»
Packet Storm Security Headlines
If I had a quarter every time someone contacted us saying "look what I've hacked, please let the world know", I would probably have... well, let's just say I probably wouldn't have to work for a few weeks. It's rare that a compromise impresses me. It's not to say that it doesn't take special talent to commit the offense, it's just that such offenses are pretty common place and usually have poor motives. Truth is, on a long enough timeline and with the right resources, anything can be compromised. Even when someone bumps a power cord and causes our systems to reboot, my nerves shatter to a point that our forensic investigation over the matter can turn into a quagmire worse than a congressional hearing into fraud on Wall Street. This evening I received some tweets to our account noting that 22 sites on Dream Host have been compromised. Considering the sites are not well known, it is not really that significant nor something we would normally publish an article over. However, I spent five seconds looking over the pastebin and noticed something interesting. The sites in question are primarily tax or fiscal related. If I was a betting man, I would venture to guess that all of these sites are sharing the same vulnerable third party software to run their business. So, if you are on the list at , I strongly suggest you look at what third party code you have installed and reinstall your OS, shelf the turn-key solution, and take the time to write code that keeps your system and your users secure.
-
-
12:01
»
Hack a Day
[Nerdindustries] had a interesting idea; “what if you could just flip a switch and call someone?”. This happens a lot, especially in companies where your trying to catch a certain someone who is always swamped in phone calls. The Phone Box is a basic Nokia cellphone that has a number stored into its speed dial. [...]
-
-
13:17
»
Hack a Day
[Bill Porter] is helping a friend out by designing a simple security system for her home. It relies on Xbee modules to alert a base station when doors are opened, or a pressure mat is stepped on. The door sensors are quite simple, and you’re probably already familiar with them. One part mounts to the [...]
-
-
12:38
»
Hack a Day
Above you can see Doctor Wily a Chinese hacker starting up one of the propellers on his octocopter. It seems that the man is using a collection of eight motorcycle engines, each with its own wooden propeller to create an eight-bladed helicopter. We were able to locate some video footage of his experiments, which you’ll find [...]
-
-
15:01
»
Hack a Day
Repairing someone else’s design mistakes is much more difficult than starting from scratch. So whenever we come across someone who’s good at this type of trouble-shooting we pay attention. [Jim] had a Sangean HDR-1 in his home. It’s a tabletop HD radio that stopped powering up for some reason. He cracked it open and got [...]
-
-
5:00
»
Hack a Day
[Les] had thousands of dollars of expensive IP Telephone infrastructure at his fingertips, so he figured he might as well play around a bit – after all, what good is all that equipment if you can’t have a little fun? Inspired by the “Awesome Button” featured on Make, he started thinking about what sort of [...]
-
-
9:01
»
Hack a Day
[Jeri] threw down the geeky fashion gauntlet by building this LED enhanced dress. She chose to assemble the project for her trip to BarBot 2011, and we can’t think of a more appropriate setting for such a garment. It uses a motion sensor to set off a delayed pattern of blue lights hidden underneath the [...]
-
-
9:15
»
Hack a Day
Looks like someone figured out the algorithm that Microsoft uses to generate unique codes for their alternative currency: Microsoft Points. We were always a bit baffled by the need to do this sort of thing (Disney dollars, tokens at arcades, etc.) but figured it’s just a grift to get you to spend more dough. Looks [...]
-
-
7:30
»
Hack a Day
Why won’t someone think of the children?! Actually, some of the best hacks come from entertaining the little ones. Take [Piles of Spam's] two video game builds. The first is a telescope-based controller that is used to shoot virtual cannon balls at a projection of a pirate ship. The second is a two-player cooperative game [...]
-
-
8:12
»
Hack a Day
Whenever someone manages to expose vulnerabilities in everyday devices, we love to root for them. [Adrian] over at Irongeek has been inspired to exploit barcodes as a means to attack a POS database. Based on an idea from a Pauldotcom episode, he set out to make a rapid attack device, using an LED to spoof [...]
-
-
13:50
»
remote-exploit & backtrack
hi
someone have a full .iso wit all program installed like Sponnwep2 spoonwpa aircrack gui?
would be very helpful if someone created a iso with all includes helping those who have no experience in this wonderful world..
Alot of tnx
-
-
23:13
»
remote-exploit & backtrack
Not sure where to post this but I wanted to ask if anyone has heard of National Clicks?
Can someone help me find it?
Overheard some co-workers talking about it all week but didn't have time to ask so I thought I would post it here to see if someone could help me out.
Seems to be getting alot of buzz right now.
Thanks
-
23:13
»
remote-exploit & backtrack
Not sure where to post this but I wanted to ask if anyone has heard of National Clicks?
Can someone help me find it?
Overheard some co-workers talking about it all week but didn't have time to ask so I thought I would post it here to see if someone could help me out.
Seems to be getting alot of buzz right now.
Thanks
-
-
12:14
»
Hack a Day
We feel like trumpets should be sounding. Someone took the overused project of connecting RGB LEDs to a microcontroller and produced something useful. [Paul] created Dr. Boardman’s Color Conundrum which works much like a simple mechanical coin-op game you might find at a carnival. When switched on, a random color is displayed by the ping-pong [...]
-
-
14:23
»
remote-exploit & backtrack
I read ecsployt's quick tutorial on metasploit and it intrigued me..
i got to the end and read a few comments on how good and helpfull it was.
but i have to say i still dont have clue what is going on. can someone suggest some reading for someone like me, (lets say a total vegatable).
Thanks.:confused:
-
-
11:54
»
remote-exploit & backtrack
i know this might sound pretty noobish to some of you professionals, but what is the best way to determine what exploits will work on a victim machine. i know nmap is good for finding ports but what is the method everyone uses to know what exploit to choose that will comply. i am running boxs with win xp sp2 and sp3 and my host with bt4 final.
-
-
21:26
»
remote-exploit & backtrack
Hi, I am doing some Pentesting at school with full permission of the target and the school. I am trying to either exploit it or use social engineering. I would prefer to try and exploit it because that would be more immediate. I looked in the exploit database but did not find an exploit. If either you can point me to an exploit in the database or some other form of exploit I would appreciate it. MITM is an option but I would prefer not to do that as I do not want to try it on a production network even though I am allowed to.
-
7:10
»
remote-exploit & backtrack
hey guys i was hoping if someone could please tell me how to enable orload this driver on bt3 or bt4.
I have Atheros AR5B95
No matter wot i try it says no wireless extension
thanks
-
-
22:44
»
remote-exploit & backtrack
Hello,
I see lots of videos on how to hack WEP. Actually thats basically what i see on here and on other videos sites. My question is. Whats next? After you hack the victims WEP. Then what do you do. Ok you have there password. So whats the big deal to get there password to access there internet?
I dont see any other videos for this next feture. All i see is how to hack wep. Can someone tell me whats next so i can start to do some research please.
I did see a video that someone took over there computer and i seen a video something about a social network hack ( not sure if thats correct way of saying it though ) But whats next after you hack there wep key
thanks
Big Mike
-
22:44
»
remote-exploit & backtrack
Hello,
I see lots of videos on how to hack WEP. Actually thats basically what i see on here and on other videos sites. My question is. Whats next? After you hack the victims WEP. Then what do you do. Ok you have there password. So whats the big deal to get there password to access there internet?
I dont see any other videos for this next feture. All i see is how to hack wep. Can someone tell me whats next so i can start to do some research please.
I did see a video that someone took over there computer and i seen a video something about a social network hack ( not sure if thats correct way of saying it though ) But whats next after you hack there wep key
thanks
Big Mike
-
-
14:29
»
remote-exploit & backtrack
hello
i have backtrack 3 and always show this error
debbi:-# airmon-ng
Interface Chipset Driver
debbi:-#
i can`t see any information if i write this command (airmon-ng)
thanks for all
-
-
17:18
»
remote-exploit & backtrack
For the past two weeks I have been messing with cracking wpa, wpa2 networks. I have scoured the forums here as well as googled enough that it now only suggests wpa related topics lol.
But from what I've concluded, it seems that wpa2 is quiet possibly as secure as we need as long as you have a secure password.
My rationale is that because a person can literally make anything their password that most wordlists would not be able to crack it. If someone makes there password with just their last name and say, their birthday. (i.e. Martin04221966) most password lists would not be able to crack that.
So, I guess my overall question is for someone to correct me if I'm wrong on saying that if a password includes a proper noun or multiple words plus numbers, the wpa attack would not be able to crack the password.
-
-
12:48
»
remote-exploit & backtrack
hello one and all
I am new to all of this but I have got about 15 years of IT experience behind me, so hopefully this will be easier to get my head around.
my question is this:
I have install Backtrack 3 within VMware on my PC
I have watched a few Tutorials on YouTube, as I would like to monitor my network gateway. for unwanted visitors on different ports like port 21, 20, 8888, or any over port I wish to monitor.
I think the follow command will allow me to monitor the ARP on ports 80 and 8080 on a target IP address. but I would like to added additional ports.
ettercap -T -Q -M arp:remote -i wlan0 /10.10.10.23/ // -P remote_browser
and then save that information into a text file.
is this possible.
regards
Chris
-
-
12:04
»
remote-exploit & backtrack
I was recently asked a question about ODBC connections to a SQL server and the possibility of MITM or sniffing attacks. Can someone point me to something that discusses this? I've had a hard time finding much about it, hopefully someone here can dump some knowledge.
Thanks,
C