Before I start, I don't care much to get a lecture on ethics or 'legality'... I'm sure we all decide for ourselves what constitutes 'ethical', and ethical doesn't always mean legal.
But being the paranoid little fuck that I am, I keep a few USB's around with Katana, a couple hundred bucks in bitcoins, my GPG keys, RSA/DSA fingerprints etc etc all on a truecrypt partition. Pretty much everything I"d need in 1 place with the general idea being that if my PC's get seized, I have all I need to continue secure communications from a public library (well, bitcoins can also be liquidated into anonymous Visa cards or any currency of choice..)
In the past, I just had a trusted buddy in the local area hold on to them for me so they wouldn't be taken in a seizure at my place, should one occur. However, after some thinking, I think it would be nice if I were able to find some other way to hide these things without accidentally making my trusted friends accomplices or whatever.
I'm sure most of you guys know this tool but for those of you who haven't tried this tool yet then it is worth a try. Guys I would like you to meet HP Network Diagnostic Utility. This tool is used by HP Techical Support Representatives( I swear to God I aint a tech support agent from HP.lol). This tool makes their job easier because they can easily troubleshoot their customers easier(but not that effective in finding errors from your HP printer.) But did you know that it retrieves WPA and WEP keys easily? Hmmm. Well while I was at my friend's house, I was able to get their WEP key without their knowledge and enjoyed free browsing(Just like to make some clarifications here for some confused users: This tool retrieved my friends wep/wpa because he won't allow me to connect anymore because I download a lot.).
An interesting article/tutorial I found that I wanted to share with the community.
http://www.symantec.com/connect/articles/windows-ntfs-alternate-data-str...
>$Grey
Introduction:
Sqli (aka Sql Injection or Structured Query Language Injection) is the first step in the entry to exploiting or hacking websites and obviously on defacing them. It is easily done and it is a great starting off point.Sqli is just basically injecting queries into a database or using queries to get authorization bypass as an admin.
How is it done:
First, you need to find an sqli vulnerabel site for example:
http://www.example.com/index.php?id=3
To check that it is vulnerable all you have to do is put a ' at the end of the url. So now your url should look like this:
http://www.example.com/index.php?id=3'
Press enter and you get some kind of error. The errors will vary but it should look something like this
http://i982.photobucket.com/albums/ae308/blink1337/1.png
or it would display like this: mysql error syntax.....
Hey everyone.. I'm in a slight predicament. Not 100% sure where this topic went.. it isn't much of a discussion, so I posted here.
ANYWAY.. a few months ago, my email account got hacked. When I have the password set to the original, i will start spamming my contacts list with a random email with a website in it. As long as I change the password (just had to do it once, don't have to do it every few days or anything) it's fine. I accidentally changed my password back to what it was, and then I started spamming people again. So i changed it to something else and it obviously stopped.
Is there anyway to remove my email address from the spambots system? How can I check to see if I have the wrong open ports or anything?
There isn't really an issue unless it is that one certain PW, but.. I don't like the thought of someone having that much easy access.
I have Avast AV, MWB, Spybot, Superantispyware, and a few other programs. No firewall anymore, I did at the time.
hey all title says most of it but not all i have a school pc and i need a way to become admin its a windows sp2 xp also i can only get at domain accounts with limited accsess my admin has blocked all the orginal ways (ex at he put a pass on admin acc locked out boot from disk)
[quote]
Well well, our first example on how the nokitel library can used.
It’s a slimmed down, “fast“, SYN-stealth portscanner. The source code is fully commented, and I hope you get a grip of the fundamental functionality.
Usage:
spoon.exe –show (Lists your network interfaces.)
spoon.exe –nic=eth0 –list=List_Of_IPs.txt –port=21-23,80 –out=Results.txt –delay=2 (A scan with eth0 and delay of 2ms.)
http://downloads.ackack.net/spoon.png
This scanner, was able to transmit 2000 crafted packets towards 2000 individual IP-addresses, per second.
Sweden have an allocated space of about ~25 million IP-addresses.
With spoon, the country of Sweden can be scanned for an individual service, say HTTP (port 80) in a pretty accurate time of 3 hours.
Yes. 3 hours.
How come it’s this fast?
Well. We have a fixed timeout of 5 seconds, no matter how many targets we’re scanning.
So we got no “delay” which would decrease the speed of the scanner.
[email protected]
give me reply!
We are looking for a professional hacker for community acc.
?****ALERT*** --loud beeps...
^^^STATUS JACKED***---*tear**
>>**SMH x 10000000
can anyone tell me what that means? i found it on a facebook page