Hacking

The seedier side of all of the above forums.

*Need help with Databases ASAP*

Need someone with high skills to get some projects completed before monday! Contact me if you have what it takes to get this done! I have moderate skills but what I need done I cannot do myself. Great opportunity for the right person!! New to site but not new to the world! Thanks

Blue Pill

Hey does anyone happen to know where I could a the reference implimentation for Joanna Rutkowska's hypervisor rootkit, Blue Pill? I know her first version ran on AMD Pacifica machines and I thought that ITL was working on a VT-x version too. I'll take help with finding either or both. Smile

DefCon 19 : Presentations from the Defcon Conference for Download

Defcon 19 presentations available for download, Go check out the presentations from this year’s defcon conference here:
http://good.net/dl/k4r3lj/DEFCON19/

For folks that don't have time to click:
curl -silent http://good.net/dl/k4r3lj/DEFCON19/ | grep -i 'pdf' | cut -d '"' -f 8 | cut -d '<' -f 1 | grep -v '/' > dc19pdf.txt; for i in $(cat dc19pdf.txt); do curl --location "http://THIS-DOWNLOAD-WOULD-BE-FASTER-WITH-A-PREMIUM-ACCOUNT-AT-good.net" -L "http://good.net/dl/k4r3lj/DEFCON19/$i" > $i; done

Original Source: http://www.thehackernews.com/2011/08/defcon-19-presentations-from-defcon...

cdma hack at defcon?

Can anyone confirm or deny this?(RaT & sx crew)This is quite interesting though
http://gizmodo.com/5829813/cdma-and-4g-wimax-supposedly-hacked-at-defcon

VSTPD v2.3.4

##

# $Id: vsftpd_234_backdoor.rb 13099 2011-07-05 05:20:47Z hdm $

##

##

# This file is part of the Metasploit Framework and may be subject to

# redistribution and commercial restrictions. Please see the Metasploit

# Framework web site for more information on licensing and terms of use.

# http://metasploit.com/framework/

##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote

Rank = ExcellentRanking

include Msf::Exploit::Remote::Tcp

def initialize(info = {})

super(update_info(info,

'Name' => 'VSFTPD v2.3.4 Backdoor Command Execution',

'Description' => %q{

This module exploits a malicious backdoor that was added to the VSFTPD download

archive. This backdoor was introdcued into the vsftpd-2.3.4.tar.gz archive between

June 30th 2011 and July 1st 2011 according to the most recent information

Man in the middle

A website I am looking at says there is a possibility of a man in the middle attack but I am wondering how to go forward with that on a website. I have done some googling but haven't found too much so far.

Thanks!

Hacking a forum username...

OK, if one wanted to hack a forum username to obtain further info about that person (in theory) then can it be done?

I'm not asking for anyone to do it, and I'm not asking for a walkthrough - however, was just hoping for a few pointers such as:

- can it be done?

- what kind of skill level would the individual need to pull off such a feat?

- I assume brute forcing would leave lots of evidence on the server so wouldn't be a viable option?

- What areas of knowledge might one need to be proficiently versed in before trying this?

Thank you in advance for any feedback.

looking for paid hacking help

Hi guys,

looking for someone who can get into database of website and collect emails of registered users.

Any idea what type of code this is

Anybody recognise what sort of coding this?

4 Œ0Dqc cDzãØðÿš×Kq

Furthermore, whether it can be decrypted? I guess it is a high-bit encryption with the need for a private key or something of that nature?

Any first impressions from you cryptography gurus would be cool... And before anyone asks I don't know what it says or relates to lol

SLAAC IPv6 attack thoughts

Curious to know what others thought of this attack.
http://resources.infosecinstitute.com/slaac-attack/

Syndicate content