Network Security
Discussions on network security, holes, exploits and other issues...
122 topics in this forum
-
Using Unique Website Passwords...
by Teddy Rogers- 5 replies
- 17.5k views
Due to recent hacks and stolen databases leaked from various websites I have been reading a bit about studies done on users' website passwords and seen various statistics on peoples poor choice of passwords; commonality, length and complexity. You would think it is quite easy to use unique passwords - and it is! Unfortunately many of us frequent numerous websites and as such human nature tends towards laziness because no one likes to remember 10 or 20+ unique passwords. People then use a password they can remember and use that password across multiple sites and don't think about lax password security exposing them to a security risk across other websites they frequent. It…
-
[ BBC Tech ] 'Indestructible' botnet uncovered
by News Feeder- 2 replies
- 5k views
More than four million PCs have been enrolled in a botnet security experts say is almost 'indestructible' View the full article
-
[ BBC Tech ] FBI targets 'scareware' sellers
by News Feeder- 1 reply
- 4.6k views
A gang that made more than $72m (£45m) peddling fake security software has been shut down in a series of raids. View the full article
-
[ BBC Tech ] LulzSec 'takes down' CIA website
by News Feeder- 4 replies
- 7.2k views
The hacker group Lulz Security claims it has brought down the public-facing website of the US Central Intelligence Agency. View the full article
-
[ BBC Tech ] LulzSec attacks UK crime agency
by News Feeder- 0 replies
- 4.6k views
The hacking group Lulz Security says it has taken offline the website of the UK serious organised crime agency (Soca), which appears to be working only intermittently. View the full article
-
[ BBC Tech ] LulzSec opens hack request line
by News Feeder- 0 replies
- 4.4k views
The hacker group Lulz Security has opened a telephone request line so its fans can suggest potential targets. View the full article
-
[ BBC Tech ] Man charged with website attacks
by News Feeder- 0 replies
- 4.4k views
A 19-year-old man is charged with five computer offences, including an attack on the Serious Organised Crime Agency. View the full article
-
[ BBC Tech ] Teenager held over website hacks
by News Feeder- 5 replies
- 5.1k views
A 19-year-old man is arrested on suspicion of hacking into websites in a joint investigation involving Scotland Yard and the FBI. View the full article
-
[book] How to Hack Like a GOD
by sparcflow- 0 replies
- 9.8k views
Hi, I would like to share a book that might help you on a hacking/pentesting engagement. It simulates a real hacking scenario from start to finish. From planting a small hardware in a store to spying on board meetings using custom scripts. No metasploit, or pesky executables that trigger antivirus alerts or startup registry keys that any newbie admin can find... Only neat opsec & up to date tricks (wmi, golden ticket, reflective dll injection, domain bouncing etc. ) You can get a copy here : http://amzn.to/2oSPvQT You will mostly find Windows stuff but there is a dedicated section about Mainframe hacking (I find it fascinating that every…
-
503 Errors?
by hotpockets- 0 replies
- 5.5k views
Just out of curiosity from my understanding, on high traffic servers, are there really no ways around 503 errors? I know this question sounds silly and probably illogical but for some servers I try to access they hit high amounts of traffic and begin to crash returning 503 errors. (Ex. some clothing sites, maybe gaming sites, etc.) There are instances where I'm running over 100 proxies and some proxies were able to get through while the others are getting 503 errors. To increase my odds of getting actual access to the server I would assume I would have to increase my numbers in proxies. Is this an irrational way of thinking? I feel there are some people who f…
-
An Illustrated Guide to the BEAST Attack...
by Teddy Rogers- 1 reply
- 5.7k views
An Illustrated Guide to the BEAST Attack http://commandlinefanatic.com/cgi-bin/showarticle.cgi?article=art027 Ted.
-
Android FakeAP
by JMC31337- 2 replies
- 9.9k views
Here is how to setup a Fake Access Point with Android Broadcom chip 4329: you must be root ultra_bcm_config executable should be in the droid's /data directory with rwx rights If yu don't know linux I suggest yu not do this 1) insmod /system/lib/modules/dhd.ko firmware_path=/system/vendor/firmware/fw_bcm4329_apsta.bin nvram_path=/system/etc/wl/nvram.txt That loads the wifi module with all the correct chipset setups as needed into android kernel 2) /data/ultra_bcm_config eth0 softap_gog APFAKER none "" 11 That uses the ultra config to setup the droids wifi as a fake ap with name APFAKER using eth0 device (yours may be different) on channel 11 with no wifi crypto set Once …
-
Apache Week. Using User Authentication
by CodeExplorer- 0 replies
- 5k views
Apache Week. Using User Authentication />http://www.apacheweek.com/features/userauth
-
BitCoin Mt.Gox Crash...
by Teddy Rogers- 2 replies
- 5k views
Seems BitCoin Mt.Gox got hacked and caused the exchange to crash, you can see it happening here... [media]http://www.youtube.com/watch?v=T1X6qQt9ONg Some more information about it on BitCoin forum... />http://forum.bitcoin.org/index.php?topic=18050.0 Ted.
-
Bounty: 30 Exploits, $5,000.00, in 5 weeks...
by Teddy Rogers- 0 replies
- 4.6k views
Bounty: 30 Exploits, $5,000.00, in 5 weeks />https://community.rapid7.com/docs/DOC-1467 Ted.
-
- 1 reply
- 6.7k views
Dear friends i have question.i want to know is there any way so we can bypass a Textbox input like name = class = i want to bypass class texbox and want to submit.
-
Bypass Cyberoam
by abhi93696- 0 replies
- 7.9k views
Is there any way to bypass speed limit of Cyberoam firewall?? Thanks in advance!
-
Bypassing website queues?
by hotpockets- 4 replies
- 17.8k views
I'm trying to access a site and I've been stuck on it's queue forever. Are there any tips to bypass the queue? I was told for Cloudflare I would just have to get the direct ip. I'm having a hell of a time finding the IP address though. An example site would be footpatrol.co.uk,
-
Bytenode v8
by brooke- 1 follower
- 0 replies
- 6.2k views
hi am having troubles with a exe protected with bytenode, has anyone here successfully created a decompiler for bytnode v8
-
- 4 replies
- 6.8k views
https://www.youtube.com/watch?v=FuYtQGfORwY
-
Challenge and help
by Aprendiz- 23 replies
- 8k views
Could anyone help me? I wore a client chat program, and this program was to start login to the site, and now the site went offline. Will you help me identify the call to the site and how to skip that call? file : http://www27.zippyshare.com/v/kBNhEDS7/file.html Hugs byvs
-
- 1 reply
- 10.1k views
A full account of the Vulnerabilities as well as detailed technical explanations were posted on 15 March 2017 on the site linked below : http://blog.checkpoint.com/2017/03/15/check-point-discloses-vulnerability-whatsapp-telegram/ Pasted some of the material from the site, in case the content goes offline in the future, as a lot of technical details were discussed and would be useful to others for future reference. Anyway I have linked to the originalsite above
-
Chinese Military TV Show Reveals More Than Intended...
by Teddy Rogers- 0 replies
- 4.9k views
/>http://www.theepochtimes.com/n2/china-news/slip-up-in-chinese-military-tv-show-reveals-more-than-intended-60619.html >http://www.youtube.com/watch?v=L_Wu1HlZbBk& Ted.
-
CIA Hacking Tools Revealed
by Kurapica- 2 replies
- 7.8k views
lots of information on several techniques and tools ! https://wikileaks.org/ciav7p1/cms/index.html
-
- 0 replies
- 7.2k views
According to Microsoft, this is a feature. https://sensepost.com/blog/2017/macro-less-code-exec-in-msword/