Network Security
Discussions on network security, holes, exploits and other issues...
121 topics in this forum
-
- 3 replies
- 5.6k views
I want to access a site (3rd party, I have no server side access to it) via HttpClient in c#. All works well but without a fact. I want to access the site most at a certain time of the day, for 3-4 minutes. But this time the server flooded by user requests and server sends http response code 504. The time is almost fixed, that is when I want to get contents from it.And it gets inaccisible for that time due to loads of user hits. Is there any technique, (such as Keep-Alive header) that can maximize my chance to get response from that site when it even gets busy? I search a lot but found nothing. If you could help me, I would be grateful. Thanks guys. I'am Adding here norma…
-
- 0 replies
- 5.1k views
FREE IT and Cyber Security Training Revolution Welcome to Cybrary! The world’s first free and open, online IT and Cyber Security training platform. We believe IT and Cyber Security learning should be free and open, and here at Cybrary, it will remain that way forever, but only with your help! In addition to our Course Catalog, https://www.cybrary.it/
-
Wireless networking tutorial
by CodeExplorer- 1 reply
- 5.4k views
A Wireless networking tutorial, in the end is shown how to create a Peer-to-Peer Network using an UTP cable. This is NOT a reverse engineering tutorial. Link: http://board.b-at-s.info/index.php?showtopic=9691 or http://www.girlshare.ro/34543697.1 Wireless.Networking.zip
-
Lenovo and the Superfish fiasco...
by Teddy Rogers- 6 replies
- 6k views
Lenovo and the Superfish fiasco... A little write up on the MITM attack... https://blog.malwarebytes.org/privacy-2/2015/02/lenovo-and-the-superfish-fiasco/ And... Komodia/Superfish SSL Validation is broken Ted.
-
Top 100 Network Security Tools
by CodeExplorer- 11 replies
- 9.3k views
Top 100 Network Security Tools />http://sectools.org/index.html
-
people pm rat with trick
by Hadits follower- 7 replies
- 6.4k views
Crack me Challenge Steganos Newbie (Junior) 0 posts Gender:Male United Kingdom Sent Yesterday, 09:21 PM Hi abcd I wanna challenge you unpack this : http://ge.tt/5iZvTd92/v/0?c it's my own security Cheers Reply That is a rat ,
-
- 1 reply
- 6.2k views
http://recode.net/2014/12/12/googles-schmidt-says-trapdoor-access-to-networks-by-government-not-needed/
-
Deploying TLS The Hard Way...
by Teddy Rogers- 1 reply
- 5k views
Deploying TLS The Hard Way https://timtaubert.de/blog/2014/10/deploying-tls-the-hard-way/ Ted.
-
This POODLE Bites: Exploiting The SSL 3.0 Fallback...
by Teddy Rogers- 4 replies
- 5.4k views
This POODLE Bites: Exploiting The SSL 3.0 Fallback http://googleonlinesecurity.blogspot.com.au/2014/10/this-poodle-bites-exploiting-ssl-30.html Ted. ssl-poodle.pdf
-
An Illustrated Guide to the BEAST Attack...
by Teddy Rogers- 1 reply
- 6k views
An Illustrated Guide to the BEAST Attack http://commandlinefanatic.com/cgi-bin/showarticle.cgi?article=art027 Ted.
-
- 2 replies
- 4.8k views
No-bullshit blog post - what a rare event these days.. http://blog.trendmicro.com/trendlabs-security-intelligence/bash-bug-saga-continues-shellshock-exploit-via-dhcp/
-
WikiLeaks releases weaponised German surveillance malware...
by Teddy Rogers- 7 replies
- 6.4k views
WikiLeaks releases previously unseen copies of weaponised German surveillance malware https://wikileaks.org/spyfiles4/ Ted.
-
Killing RC4: The Long Goodbye...
by Teddy Rogers- 0 replies
- 5k views
Killing RC4: The Long Goodbye... http://blog.cloudflare.com/killing-rc4-the-long-goodbye Ted.
-
- 1 reply
- 6.9k views
Dear friends i have question.i want to know is there any way so we can bypass a Textbox input like name = class = i want to bypass class texbox and want to submit.
-
Framework for Improving Critical Infrastructure Cybersecurity...
by Teddy Rogers- 0 replies
- 4.8k views
Framework for Improving Critical Infrastructure Cybersecurity Ted. NIST-cybersecurity-framework.pdf
-
Improving Firefox SSL/TLS Security...
by Teddy Rogers- 0 replies
- 4.8k views
Improving Firefox SSL/TLS Security https://blog.dbrgn.ch/2014/1/8/improving_firefox_ssl_tls_security/ Ted.
-
Refrigerator Hacked...
by Teddy Rogers- 2 replies
- 5k views
Refrigerator Hacked http://www.businessinsider.com.au/hackers-use-a-refridgerator-to-attack-businesses-2014-1 Ted.
-
Misconceptions About Forward-secrecy...
by Teddy Rogers- 0 replies
- 4.3k views
Misconceptions About Forward-secrecy https://blog.thijsalkema.de/blog/2014/01/17/misconceptions-about-forward-secrecy/ Ted.
-
Snapchat 4.6 Million User Phone Number Database Leaked...
by Teddy Rogers- 1 reply
- 5.1k views
If your keeping up with Snapchat events you will likely know Gibson Security have been warning over the past month on the number of potential exploits for it, in particular the Find Friends feature. What Snapchat blogged about in its defence... Oops... theoretically it's happened... http://www.snapchatdb.info/ Ted.
-
Operation Blackout
by blackpirate- 1 follower
- 5 replies
- 7.6k views
http://pastebin.com/GFkQnf6e "The greatest enemy of freedom is a happy slave." To protest SOPA, Wallstreet, our irresponsible leaders and the beloved bankers who are starving the world for their own selfish needs out of sheer sadistic fun, On March 31, anonymous will shut the Internet down. ----------------------------------------------------------------------- In order to shut the Internet down, one thing is to be done. Down the 13 root DNS servers of the Internet. Those servers are as follow: A 198.41.0.4 B 192.228.79.201 C 192.33.4.12 D 128.8.10.90 E 192.203.230.10 F 192.5.5.241 G 192.112.36.4 H 128.63.2.53 …
-
- 1 reply
- 10k views
Hey guys, Maybe some of you know "VMProtect Web License Manager" it's a Web application made by VMProtect to manage licenses and stuff. I've gived a try into WebLM by chance (i've found a malicious software who was using VMP License Manager, and that how i started to be interested into hacking the web application of VMP) At first i've found an XSS (Cross Site Scripting) and a LFI (Local File Include) vulnerability. One day after, i reported the bug via the website of vmpsoft.com and i got a fast answer from the vmp support. On my second mail i've even attached the content of their etc/passwd as proof that it's a 'serious' problem. And i don't know what they have do …
-
Android FakeAP
by JMC31337- 2 replies
- 10.4k views
Here is how to setup a Fake Access Point with Android Broadcom chip 4329: you must be root ultra_bcm_config executable should be in the droid's /data directory with rwx rights If yu don't know linux I suggest yu not do this 1) insmod /system/lib/modules/dhd.ko firmware_path=/system/vendor/firmware/fw_bcm4329_apsta.bin nvram_path=/system/etc/wl/nvram.txt That loads the wifi module with all the correct chipset setups as needed into android kernel 2) /data/ultra_bcm_config eth0 softap_gog APFAKER none "" 11 That uses the ultra config to setup the droids wifi as a fake ap with name APFAKER using eth0 device (yours may be different) on channel 11 with no wifi crypto set Once …
-
TCPIP.SYS raw sockets
by JMC31337- 4 replies
- 6.9k views
fig'd since the mcsft update patch keeps us from being able to fully utilize our OS it belonged in the security thread this site goes into details about modding up tcpip.sys to allow raw sockets (ancient chinese secrets) http://blog.csdn.net/aerror/article/details/2467775 and this site goes into details about allowing unlimited connections for our tcpip.sys sockets unlimited connections but it doesnt solve the problems of RAW TCPIP contsruction http://www.msfn.org/board/topic/25308-new-sp2-patch-kb884020-update-the-tcpipsys-file/TCPIP.SYS 359,040 bytes, version 5.1.2600.2505Offset 130 (This is the checksum!) FROM: 27 C3 05 00 TO: 1B C4 05 00 (<--- corrected ch…
-
hackme challenge
by 13579xxx741- 0 replies
- 5.6k views
Hello, can anyone associate the fist block with the second one? It seems that only the user "mysql" has access via ssh! But which password is the right one? I also tried serveral password-combinations for "matrixuser". Can anyone understand the deeper meaning of this hackme? ################################################################ #Hier find3st du einig3 Daten die du vielleicht brauchen wirst!# ################################################################ Details About the Ship-Nebuchadnezzar >: Captain: Morpheus First mate: Trinity Pilot: Dozer, Link Operator: Tank, Link Other crew: Apoc, Cypher, Mouse, Neo, Switch Weapon: EMP Terminal Lo…
-
- 2 replies
- 5k views
How a grad student trying to build the first botnet brought the Internet to its knees http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/01/how-a-grad-student-trying-to-build-the-first-botnet-brought-the-internet-to-its-knees/ Ted.