why hasn't someone come up with a small device with preloaded tools and a super massive dictionary that would hook up your laptop, etc. and act as a wifi receiver with injection capabilities that automatically tries everything that is programed into it to crack the wifi password? it could even be weather-proof and solar powered so that one could drop it in a conveniently hidden location, gather tons of packet data, and cracks the password. that way, you could set it a close as possible to the...
All of my hacks up to this point have been operating system hacks. In other words, we have exploited a vulnerability usually in an operating system service (SMB, RPC, etc.) that all allow us to install a command shell or other code in the target system.
Remember the Power Pwn, the clever little hacking tool disguised as a power strip? It's great in theory, but with a $1,295 price tag, it definitely doesn't fit into most people's budgets.
In my first few articles, we focused on operating system hacks. These hacks have been primarily on older operating systems such as Windows XP, Windows Vista, and Windows Server 2003.
What's your Twitter handle worth? If it's considered "desirable" (aka short and simple), it'll get you around 100 bucks, or, if you prefer, the affections of a teenage girl.
It seems like every other day there's a new security threat or data leak in the news. Whether it's your credit card PIN or your smartphone's apps leaking your email address, no one wants their personal information out there, especially passwords. And if you use the same email address and/or password for more than one site, the effects of someone getting hold of your credentials can be catastrophic.
I was reading one day in Maximum PC or PC World Magazine that all hard drives made by any one particular manufacturer are all the same. the only difference is that some of the disks are disabled, so I recently bought a 1 TB external hard drive in the hopes that I could enable the "hidden" disks. If there is truly a way to do this, could someone tell how, or point me to an article that could show me? I've searched the internet with every search term I could think of. nadda.
You've probably noticed how we like to stresstheimportanceof astrong password. After all, there are still people out there who continue to use passwords like 123456 and even just "password". But passwords aren't the only barriers that protect your information.
I've decided I've not been writing enough and want to get back into writing more often. I have a few ideas for articles based on password cracking and breaking into Windows, and a basic general coding type of articles, but I wanted to know if anyone had anything they wanted to know how to do, a language they wanted to learn the basics of or something like that. Please comment with any ideas.
There are loads of reasons for somebody to want to recover a Windows password, and there are lots of different ways of doing it. My favorite of all of these ways is to use a piece of software called Ophcrack because:
My first article on Wonderhowto was a post on using Ophcrack to break into Windows PC's, I've now written an updated version of that article here on helium. I will still be writing on Wonderhowto but I've decided to try writing all over to see which is the best for me. The new article includes everything the old article did, but instead of using an "unlisted ISO" you can use the listed one, and the new article includes short paragraphs on how Ophcrack works and how to prevent it being used...
While becoming the next Mark Zuckerberg may be out of reach for someone just getting introduced to code, the skill has never been more valuable. Just understanding basic programming language is a great thing to put on your resume, and if you know how to code, you're golden. Software developers and programmers have been the most resistant to the recession, as jobs in the tech industry continue to grow.
Want to take advantage of your neighbor's super fast Wi-Fi connection? If they're smart, they probably have it password protected (otherwise you wouldn't be reading this, would you?). But if you have an Android phone, you can get back at them for always parking in your spot and slamming the door when they get home at 2 a.m.—by stealing...er, borrowing, their connection.
If you're one of the people who make up the nearly 24% of Internet users on Internet Explorer, now is a good time to click on 'Check for updates.' Researchers have found yet another Metasploit Zero-Day exploit that leaves IE 7, 8, and 9 vulnerable for Windows users.
I spend a lot of time on IRC but I do not like to use IP2P. I would like to see a non-IRC2P network so the loveliness that I'm sure our channel is can be joined by us non-IP2P'ers. Anyone think this will be done any time soon?
When I left off on our last hack, we had hacked into the ubiquitous Windows Server 2003 server by adding ourselves as a user to that system so that we can return undetected at any time. The problem with this approach is that a sysadmin who is on their toes will note that a new user has been added and will begin to take preventative action.
Windows users have been getting a lot of bad news about their security lately. First, we found out that passwords in Windows 7 and 8 can easily be exploited if password hints are enabled, and now, Russian password-cracking software developer Elcomsoft has found another huge vulnerability.
All kinds of people pretend to be someone they're not on the internet, including scammers, people attempting to wind others up, hackers and web predators. Almost all of these people will leave bases uncovered and they're all easy to expose when you understand how to. Here are my favorite ways of finding out when somebody is lying quickly.
Hey Null Byte, I was wondering, is it possible to set up a free cloud like dropbox to mine for bitcoins even when you're not connected to the cloud? If so, can someone tell me the steps to do that? Thanks a million as always!
Welcome back, hacker novitiates! In the next few hacks, we will be breaking into Windows servers. In this installment, we will learn to add ourselves as a user to a Windows 2003 server. Of course, when we have added ourselves as a user, we can come back any time and simply log into our account without having to hack into the system and risk detection.
Earlier this week, Spiderlabs' vulnerability researcher Jonathan Claudiusdiscovered a key in Windows 7 and 8 registries that makes it easy for anyone with physical or remote access to a computer get a hold of the user's password hints.
It can be extremely frustrating when you've forgotten the pattern you use to lock your smartphone, and even more so if someone has managed to prank you by changing it. Luckily, there's an easy fix if you know the username and password for the Gmail account you used to set up the lock.
Security researcher and iPhone hacker pod2g has brought attention to a flaw in Apple's iOS that allows the user to change the reply address of an SMS message. This bug has been a part of the iPhone's SMS since the first iPhone in 2007, but Apple has yet to address it.
If you've ever mistakenly moved your music files around without relinking them in iTunes, you might now be noticing that you have a long list of tracks asking you to relink them.
Even though we all know it's a bad idea, a lot of people still use their browser's store password function to keep up with all their accounts. While convenient, this shortcut also makes their passwords very easy to find if you have access to the computer they're stored on.
Have a PC but hate Windows? Maybe you've just heard a ton about the new MountainLionOS X and want to see if it lives up to expectations. Either way, you can install Mountain Lion on your Intel-based PC in a few easy steps. All you need is a copy of the OS X and an 8 GB USB flash drive.
If you use Ubisoft's uPlay browser extension, you should probably get rid of it right now. An Information Security Engineer at Google discovered that the plugin has a hole in it that allows programs to be installed through uPlay, essentially letting anyone who feels so inclined to take over your computer.
Do you own an HP printer? If so, it may be vulnerable to malware attacks. Researchers at Columbia University discovered that 25% of Hewlett-Packard printers have significant vulnerabilities that put your printer in danger from hackers—even your home.
The team behind the Pwn Plug, a little white box that can plug into any network and access it remotely, is at it again. This time, Pwnie Express is working for DARPA to create a hacking machine that looks like a power strip, cleverly called the Power Pwn.
Some of us use our smartphones for almost everything. Manufacturers know this, so they try to make their devices as convenient as possible to use, but sometimes that convenience comes with a cost to security. The very same technology that allows you to easily share music with friends and make purchases can also put you at risk.
alright null byte here is several more questions: 1. what is rooting? 2. what is it used for? 3. can i make root-kit myself? 4. if so, how do i make one?
Yo nullbyte, it's been a while. I'm in the market for a filtered internet service provider that blocks all of the nasty stuff on the internet straight from the server. if there is such an ISP, I need to know, but after talking with a sales rep for true vine online, he says that a service like that is illegal because of first ammendment rights to freedom of speech, etc. he said that the only way to filter something is to install software that filters it outside of the server. the only proplem...
i have low bandwidth and a slower connection at home, i am looking for a solution to this. What I am currently doing is downloading a torrent and uploading files to multiple PayPerDownload sites, im still on my first 'wave' of uploads, ~44gb, this is taking far to long, ~200kbps max upload total. Is there some kind of 'remote desktop' where i can use uTorrent and upload the files to the PPD sites from that much faster connection? Would a grid-service from MediaTemple work or even a Virtual...
There are lots of people who want to stay anonymous online, and lots of reasons they want to do this. Staying anonymous on the internet isn't easy, and it's probably possible to trace almost anyone with enough time and resources. A lot of people think that they're completely secure with just one method of cover. For example, a lot of people thought anyone using the Tor network was nearly untraceable, but then things like this often cast doubt on just how secure these networks are. Unless you...
I'm trying to mask my IP using TOR + ANOMOS to download .torrent files. I'm able to start both TOR and PRIVOXY, but I simply cannot get ANOMOS to work. I able to enable TOR on CHROME, using "Proxy Switchy!". For that, I used 8118 (privoxy) and 9050 (tor). In ANOMOS, I've tried both 127.0.0.1:8118 and 9050, and keep getting errors:
i am making a new site to capitalize on PPD and am looking to keep my name out of it as much as possible and stay safe from suits as much of my uploads will be Copyrighted material. I am going to host with PRQ(they did WikiLeaks and was founded by the same cats as PirateBay.se) but am looking at how to register my domain as secret as possible... or with a register that will not hand over my information, any ideas?
There are a lot of programs which allow opening archives. Alas, most of them are rather complicated to use. The process of the archive opening often takes much time. Hopefully, there are some programs which are simpler to use for regular users.
There are a lot of programs which allow opening archives. Alas, most of them are rather complicated to use. The process of opening of the archive often takes much time. Hopefully, there are some applications which are simpler to use for regular uers.
AppleScript is quite an easy scripting language to use. In this guide, I will be showing you several commands. Near the end, I will show how these can be used to create a fake virus that actually does no harm.
Is it just me that thinks as well as some adding some good things they've removed a lot of the best bits of the site, I mean there are some quite big improvements, I quite like the new layout but so far I've had quite a few problems with the editor and while it's not vital I liked being able to see how many views a post had, can you still do that?
I am currently starting to learn the Python programming language, programming languages make up all the programs that we use, that is enough for it to fascinate me if it isn't for you then maybe start reading this and you will quickly see how powerful it is. This is my first programming language to learn (kinda) and this post is going to be my attempt at passing my learning of Python along to you as I go. This post will be updated as regularly as I go along learning. I am going from the ground...
So, I know that math post was mad basic. Actually covering grade school operations, crazy right? I was thinking that I would get some kind of feedback from the community at large to that effect with, ideally, some kind of "I was really hoping you did _______ instead…." because just saying "A post on useful math!" means basically everything. I would like to share the knowledge and understanding I have but this is a multi-year formal education styled accumulation of complicated material with a...
A lot of different places have computers with controls on them for several things; some have controls for installing software, some for running software, blocking websites, opening certain file formats, etc.
It was brought up a while back in a Community Call to Arms that *math* is handy for encryption (and let's face it, everything) so let us go over things you just have to know. "In its simplest meaning in mathematics and logic, an operation is an action or procedure which produces a new value from one or more input values."[source]
As many of you know Windows is not the most secure Operating System in the world, but then again no OS is really secure if the user doesn't know how to protect themselves. Later I will show you how to lower the risk even more on your (the user's) end.
If there ever was a time for Null Byte to need people to contribute, it's now. Let's make Null Byte a place where anyone, from novice to master computer user, come and learn. It has been sometime since the last "Call to Arms" for Null Byte, and even longer since the last "Weekend Homework". We all know that this time of year is busy for everyone, but that didn't stop occupytheweb otw from creating a great article in his continuing "Hack Like a Pro" series.
Just signed up and wanted to say hello to everyone. I am a college student in a somewhat unrelated field to IT, I do however have a very strong interest in network security and programming. Right now I am working through Learning Python by Mark Lutz and am picking up bits and piece on networks where I can. I'm liking the website and will try to work backward through all the posts. Any tips/websites feel free to send them my way, hopefully I will be contributing soon enough!
Hey, hackers! Now that you've hacked/owned your first "box" in my last article, let's look a little closer at another great feature of Metasploit, the Meterpreter, and then let's move on to hacking a Linux system and using the Meterpreter to control and own it.
i've seen several adds especially on youtube about credit card number generators, moneypak number generators and some for phone cars as well. is this real and if so can someone let me know which is the easiest to use...