Ethical Hacking

For this "tutorial" we will use a real program called PDF2Word.
I stumbled upon this program when trying to convert a pdf document to a word document (duh..).

The funny thing about this program is that it costs $39.95 and that it is released under the GPL.

Let's start shall we?

1: Obtain a copy of the program at http://www.verypdf.com/pdf2word/index.html
We will use version 2.6 in this tutorial.Read more..

Your rating: None Average: 2 (1 vote)



WarVOX is a suite of tools for exploring, classifying, and auditing telephone systems. Unlike normal wardialing tools, WarVOX works with the actual audio from each call and does not use a modem directly. This model allows WarVOX to find and classify a wide range of interesting lines, including modems, faxes, voice mail boxes, PBXs, loops, dial tones, IVRs, and forwarders. WarVOX provides the unique ability to classify all telephone lines in a given range, not just those connected to modems, allowing for a comprehensive audit of a telephone system.

WarVOX requires no telephony hardware and is massively scalable by leveraging Internet-based VoIP providers. A single instance of WarVOX on a residential broadband connection, with a typical VoIP account, can scan over 1,000 numbers per hour. The speed of WarVOX is limited only by downstream bandwidth and the limitations of the VoIP service. Using two providers with over 40 concurrent lines we have been able to scan entire 10,000 number prefixes within 3 hours. Read more..

Your rating: None Average: 4.3 (7 votes)

Introduction

Writing a buffer overflow attack against a Windows program present several challenges that make it a bit more difficult than writing exploits on a Linux platform. In addition to not having popular tools such as gdb (the GNU Debugger) an attacker is faced with a closed box. Not only are most Windows applications closed source, but the operating system itself doesn't provide much transparency. When taken together this makes an attackers job fairly daunting.

Windows buffer overflow attacks are quite possible, however, and I'm writing this tutorial to walk you through developing one such attack. This article assumes some prior knowledge of assembly, x86 architecture, C and Perl programming. I hate to raise the bar like that, but if you're not familiar with these concepts then writing buffer overflows will be next to impossible as their inner workings hinge on all of these topics. While there are many tools you can use to assist in the process of finding and exploiting buffer overflow vulnerabilities, without a thorough understanding of how they work you're going to have a very hard time actually creating new exploits. Read more..

Your rating: None Average: 3.3 (9 votes)

Computer Hacking is no longer the black art of computer geniuses. Exploit scripts and hacks are available to anyone with a web browser, so prepare yourself

to protect your network by looking at security from a hacker’s eyes. Understanding what attack vectors might be used on your systems is a fundamental piece

of the security toolkit. VTC Authors Brad Causey and Bobby Rogers present computer security from an angle that aims to put you into the seat, to protect your

network through Ethical Hacking and Penetration Testing. To begin learning today, simply click the links.

Title: Ethical Hacking & Penetration Testing
Author: Brad Causey & Bobby Rogers
SKU: 33718
ISBN: 1-933736-46-1
Release Date: 2006-10-06
Duration: 7 hrs / 82 lessons



150MB Only

PLEASE NOTE :
U REQUIRE ULTRA ISO/WINRAR & VLC MEDIA PLAYER

Download:Read more..

Your rating: None Average: 3.5 (2 votes)

Tool Physically Hacks Windows

Lets an attacker use Firewire to take over a 'locked' Windows machine

No screwdriver required: A researcher has released a plug-and-go physical hacking tool that uses a Firewire cable to “own” a Windows machine within seconds.Read more..

Your rating: None Average: 1.5 (2 votes)


Introduction

Hacking web application was always curious for the script kiddies. And hacking free web email account is every geek first attempt. The method which I will describe in this post is not new; the same method can be applied to yahoo and other free web email services too.

The method we will be using is cookie stealing and replaying the same back to the Gmail server. There are many ways you can steal cookie, one of them is XSS (Cross site scripting) discussed by other is earlier post. But we won’t be using any XSS here, in our part of attack we will use some local tool to steal cookie and use that cookie to get an access to Gmail account.

Assumption:Read more..

Your rating: None Average: 1.7 (3 votes)

Search

Loading

Sponsered links

Bookmark Us!

Share/Save

Page Rank

Quotes

The worth of shade is only known when the sun is beating down hot

Explore Tags

Follow Us