Quick Access

User login

Who's online

There are currently 0 users and 8 guests online.

Visitors Map

Site Counter

  • Site Counter: 443287
  • Registered Users: 56960
  • Published Nodes: 330
  • Your IP: 148.251.14.166
  • Since: 2008-09-09

Link Exchange

BlogCatalog Blog Directory
Technology Business Directory - BTS LocalTop stories
Click here
         SecGeeks
       Megapanzer

Live Traffic Info

Security



SHODAN lets you find servers/ routers/ etc. by using the simple search bar.You can search by keyword, and/or using any of the advanced search options.

Check SHODAN:

  • country:2-letter country code
  • hostname:full or partial host name
  • net:IP range using CIDR notation (ex: 18.7.7.0/24 )
  • port:21, 22, 23 or 80

Lets say you want to find servers running the 'Apache' web daemon. A simple attempt would be to use:

apache

How about finding only apache servers running version 2.2.3?

apache 2.2.3Read more..

Your rating: None Average: 4 (3 votes)

Your rating: None Average: 3.4 (8 votes)

This is a simple tutorial on, How to hack the WEP key of a wireless network. We have the tools available in ubuntu to get the WEP Key.  Before proceeding this I am mentioning the complete steps below along with the pre-requisites. This article seems to be very lengthy but please be patience while reading Read more..

Your rating: None Average: 3.7 (3 votes)

Theres plenty of papers out there that go into how to obtain an IP Address from the preferred mark of your choice. So I'm not going to go into that subject. Alright so say we got the targets IP Address finally. What do we do with this IP Address. Well first ping the IP Address to make sure that its alive. In otherwords online. Now at the bottom of this document ill include some links where you can obtain some key tools that may help on your journey through the electronic jungle. So we need to find places to get inside of the computer so we can start trying to find a way to "hack" the box. Port Scanners are used to identify the open ports on a machine thats running on a network, whether its a router, or a desktop computer, they will all have ports. Protocols use these ports to communicate with other services and resources on the network.

1) Blues Port Scanner - This program will scan the IP address that you chose and identify open ports that are on the target box.

Example 1:
Idlescan using Zombie 
(192.150.13.111:80); Class: IncrementalRead more..
Your rating: None Average: 4 (10 votes)

Intercepting keystrokes

Hooking Key Events

There are different ways to catch the keys as they are being typed, but one of the most efficient is to monitor system events for key events. This is done with a hook, which forces Windows to call your own functions when a certain type of event happens.

First, let's see how you can set a hook to catch keyboard events, with SetWindowsHookEx(): Read more..

Your rating: None Average: 4.6 (7 votes)


[Laurent Gaffi?] has discovered an exploit that effects Windows Vista, Windows 7, and possibly Windows Server 2008 (unconfirmed). This method attacks via the NEGOTIATE PROTOCOL REQUEST which is the first SMB query sent. The vulnerability is present only on Windows versions that include Server Message Block 2.0 and have the protocol enabled. A successful attack requires no local access to the machine and results in a Blue Screen of Death.

POC
==========================================================
Smb-Bsod.py:

#!/usr/bin/pythonRead more..
Your rating: None Average: 3 (2 votes)

Search

Loading

Sponsered links

Bookmark Us!

Share/Save

Page Rank

Quotes

We would accomplish many more things if we did not think of them as impossible.
— Sajeev

Explore Tags

Follow Us

buy tablet pc