As you all may know already, Blake has given a talk at Defcon about this subject and will be giving two additional talks this year again one if not both about the very same subject. I did some research and found a book by one of the best known Cable Modem Hackers DerEngel The book is called "Hacking the Cable Modem: What Cable Companies Don't Want You To Know"
I am linking to it here.
>$Grey
I want you to change index.html this site
Because
the site make fun me
the owner site not enter the site since year ago
What is the amount required?
the site
y-masters.com
I found this gem while browsing through a mailing list. Very nice article it is a little old but still has good information. If your stuck behind your school or company's firewall you should check this out. Prop's are due for the original author as it is easy to understand and a classic example of a hack (a quick and creative work around to a problem).
How to Bypass Most Firewall Restrictions and Access the Internet Privately
Just came across this little video snippet.
http://feeds.abcnews.com/click.phdo?i=971da808681adc1ce61fef0edf5ad689
Seems there has been a worm written for any Iphone or Ipod touches that have had the DRM removed from the system by the Jailbreaking process. makes me wonder whether or not it was a good idea to Jailbreak in the first place. what other possible consequences or opportunities do you see as a result of this?
>$Grey
Hi I used to work for Geek Squad till they fired me for starting my own business. But i have all there softwares and love using them can anyone tell me a way to prevent it from phoning corp and changing the logo so i can use it infront of customers. Thxs Ryan
In this tutorial i explain how easy it can be for one to hack into your computer or network and maintain his access at any later time. The art of hacking comes only when you can break in and stay in. Most attacks are realized as soon as they take effect, and the victim is likely to block or patch the attack. In such a case you will need to have a way through which you can still get in without having to run a pile of exploits on the victims box. We look at how useful Meterpreter services (metsvc) can be and how you can crack password hashes in a few seconds. I demonstrate the use of filter files with ettercap to make a spoofed attack. I hope it helps
Part One:
http://www.youtube.com/watch?v=Q4a76gEF5nY
Part Two:
http://www.youtube.com/watch?v=gPM8x7cPhBs
The filter file can got from http://blindsecurity.org/filter.html
Saw this story @ The Reg, thought I'd pass it along, pretty interesting:
http://www.theregister.co.uk/2010/05/13/diy_twitter_botnets/
DIY toolkit for controlling bots via Twitter posts - which means remote control from your mobile device.
With metasploit, it's possible to get any windows binary file and use it as a backdoor on a victims computer. You can gain metapreter shell at any point. All that needed is to embed the metasploit payload into any executable that you want. Below is a step by step instructional video
I am tired of this so called "Church"s shit. Anyone able to take it down?
Firefox from it's first install is not giving you the best that it ton thatcould. there is a little tweak you can do to speed up page loading. What we will be doing is enabling Pipelining. Normally your browser will only process one thing at a time and wait till it is fully processed until it moves to the next thing to process, this can slow things down if there is a lot of dynamic content on the pages you are loading. Pipelining allows the browser the ability to begin processing more information before it is done with another, speeding up page loading.
We shall begin by typing about:config into the address bar, typically it comes up with a message about a warranty, you click the button that says you know what you are doing and continue. The next step is to filter out only the entries you wish to modify. type in the Filter box pipe
you should get four things:
network.http.pipelining
network.http.pipelining.maxrequests