A Guide to Kernel Exploitation: Attacking the Core was recently released. It is a really awesome book on kernel exploitation. I would advise anybody interested in the topic to order a copy.
Do any of you know of tools similar to LOIC (http://sourceforge.net/projects/loic/) but not so shitty?
use URL shorteners plz
Thought this might peak some interest so I'll throw it out there. tell me if you have already heard of it or done it. or if you know of patches that have closed these holes.
it regards the way routers handle certain packets related to DNS handling that if tweaked and sent to the right port would in some cases, crash the router. it has been noted on this site that if this knowledge was harnessed it would theoretically be possible to change settings on the router, essentially hijack it to promote further pwnage.
http://www.grc.com/dns/crashtest.htm
>$Grey
https://www.soldierx.com/tutorials/Password-Recovery-Windows-XP
Read the "guideline" but have to state that i first came across sx through the cracked version on the gs's mri which is by far one of my favorite tools when removing passes and such. (i can edit or a mod can edit this if it should be removed, also if the wrong section let me know)
So heres the scenario: I have a laptop in my possession from a friend that only has a limited account that i can access. "admin, administrator & the bios" are all passed leaving me with the options to reformat or find another alternative to get in.
Someone has stolen my girl's account and is sending fake emails with bad links in them. I would like to find out original IP and where I should go from here. This will give me a reason to test my blooming hacking skills. Here is the header and let me know if there is anything else you need:
X-Vipre-Scanned: 00EEFCE9001ABF00EEFE36
Received: from cfw2.ipc.local (10.0.233.3) by ***** (*****)
with Microsoft SMTP Server (TLS) id 14.0.702.0; Wed, 8 Sep 2010 12:46:13
-0600
Received: from out13.sjc.mx.trendmicro.com (216.99.131.50) by
****** (********) with Microsoft SMTP Server (TLS) id
14.0.702.0; Wed, 8 Sep 2010 12:46:11 -0600
Received: from in13.sjc.mx.trendmicro.com (unknown [10.30.239.9]) by
out13.sjc.mx.trendmicro.com (Postfix) with ESMTP id EC911980468 for
<********>; Wed, 8 Sep 2010 18:47:04 +0000 (UTC)
Received: from n72.bullet.mail.sp1.yahoo.com (unknown [98.136.44.34]) by
in13.sjc.mx.trendmicro.com (Postfix) with SMTP id A92B0CAB029 for
i want to add more .rb exploits to my metasploit 3.4 and i cant =(
i search a lot of forums and i cant get any god answer adding files to .msf3 hidden directory,
copy fileformat.rb; please help!!! Im using snowleopard terminal
hey guys,
im new to this forum, but i like it so far. heres what im looking for. some advice. i have found that it is harder to hack an email of someone who knows you than it is a stranger.
a little back ground: my sister in law thinks her husband is cheating, he hides all account info and she know none of it. he done other things also that is off topic but unacceptable. so i am trying to hack his email to spy on his activities.
this is what i have tried:
1. sent phisher for hotmail and facebook(figures usually is same pass) but no go.
2. sent keylogger binded to pic as .exe and zipped, decrypted. nothing. not sure if he just doesnt know how to open it or not. sent instructions on how to open it also. (even though i thought that was supisous)
3. started new email account at hotmail that resembles a trusted contact of his, that is how i sent the emails so he wouldnt think something was up.
Hello Communty,
I'm fairly new to LInux and Metasploit
My question is can I know / you as I can by Metasploit Mssql cracking?
Srry for my bad English
Hey Guys,
I would like some advice on this. I have a good friend of mine being blackmailed by someone who managed to get pictures of her (Semi-Nude) and is blackmailing her for full pics or they will send them to her contact list the got from her email. They have proved they do have pictures by sending them to us as well as the list of contacts and Facebook. I am looking for any ideas on what can be done to take back control of the situation. I have already tried a RAT, but he won't accept anything in .ZIP format.
Thanks for you help,
Drew
There is a little thread elsewhere on the forums dedicated to iPhone and iPod Touch hacking and modding coined "Jail Breaking" I am here to share what little experience I have with it and to take questions if any have some.
A few definitions taken from other sources are:
"Jailbreaking"- To break the DRM (Digital Rights Management) Restrictions imposed by Apple and AT&T to limit what you can install or DO with the device.
Blackra1n - A jail breaking program written by George Hotz for the iPhone/iPod Touch firmware 3.1.2 and below.
redsn0w - A jail breaking program written by the iPhone Dev Team that jailbreaks stock iPhone/iPod Firmware
Ultrasn0w - An unlocking program for iPhones that unlocks the baseband of the phone to allow it to be used with other carriers
Pwnagetool - Another jail breaking program made by the iPhone Dev Team that is capable of jail breaking the latest firmware.
Ok we have the basic terms out of the way so hopefully I don't lose anyone.