Hacking

The seedier side of all of the above forums.

need help to hack email of suspect of my fathers murder

my father was murderd a few days ago and i just found out about it yesterday. his killers are still on the loose. he was in panama in a small town with 6 cops one vehicle and not known for detective work. the embassy says we are basically at the mercy of the police there. the embassy has been pretty much useless to us. some people have blogged about his murder http://www.chiriquichatter.net/blog/2010/03/29/gringo-murdered-in-algarr...
http://www.panama-guide.com/article.php/20100329154902753
http://www.panama-guide.com/article.php/20100330130722855
http://www.panama-guide.com/article.php/20100330151400278
the ladys email is [email protected]

counter strike source script to bypass rcon console

has anyone wrote or seen these scripts to bypass rcon console or to break password?

Xm Radio

Hello all,

Dont know if I am posting this in the right thread, but this seemed the best choice.
Ok I was thinking the other day(very dangerous of me). How cool would it be to know how a xm radio works. I am looking for any info on this topic and not coming up with many knowledgeable refrences yet!
My key intrests are how the data is transfer and what kind of encyptions the software uses and what software it is and so forth. I would love to one day create a exploit for this .Won't say FREE Xm radio but maybe something like getting a program on the display that connects to internet radio and alows me to search for channels (SX radio back again then in my car on the way to work sounds awsome!)
If anyone knows a direction to point me in that would be amazing.If anyone thinks this is worth the look in to that would be helpful too 4 eyes are better than 2!
Sorry for the not so well veresed idea but had to post

TA,TA

Scam List

Have you ever gotten an email saying you won some kind of lottery or that you were the sole beneficiary of some dying rich person and you just knew it was a scam?
if you can get the IP address from the header list it here. let the other n00bs try and hack em for practice. good site to check the header info for IP addresses is: http://headertool.apelord.com/headers

IP List:
115.240.82.207 India (Mumbai)*

If anyone fancies a challenge

Taken from theregister.co.uk
http://www.reghardware.co.uk/2010/03/22/victorinox_swiss_army_knife_hack/

Swiss Army Knife maker Victorinox is asking the best of Britain's hackers to try and beat the biometric security built into its latest USB Flash drive-fitted penknife.

If you manage it, you stand to win £100,000.

The company will be holding trials at its New Bond Street, London shop this coming Thursday and Friday, 25 and 26 March. To have a bash, you need to download and return an application form by Wednesday.
Victorinox Swiss Army Knife

You can get the form here, where you'll also find the contest's Ts&Cs. - http://playthefuture.co.uk

If you're selected as a participant, you get two hours in which to try and hack the knife. Whether you manage it or not, you get to keep the penknife itself - and take home a £200 shopping voucher, Victorinox said.

Footprinting data

read second post

Everything you need to become a perfect Hacker

Ok.....I've got a number of requests from different people asking me where to start from in order to learn hacking. The first thing i always say is that, "You never learn hacking, you build onto it!". As you go on you will realize that it's all about looking at usual things in a new way. It's getting your hands dirty with a couple of programing and tools exploration.

First there is nothing like a hacker's language. All programing languages are good, it's only the portability and know-how level that could limit you. But ofcourse, there are a few things you may want to consider because they top my list.

1. Learn Assembly programing, atleast be able to interpret it.
2. C is a good and powerful language to start with. However, as time goes on you will need to get your hands used to either Python,Perl,PHP or Ruby. You will never regret knowing at least two of them
3. TCP/IP networking
4. Unix shell programing
5. Get your self a copy of BACKTRACK and familiarize yourself with it.

Distributed Computing and RSA encryption

I thought this little bit of info was interesting:
http://library.thinkquest.org/C007645/english/2-rc5-0.htm
One Internet organization, Distributed.net, is trying to make sure the United States's encryption standards are tough enough by breaking them. Their project, RC5-64, uses distributed computing to solve an encryption key by RSA Security, a company responsible for encrypting not only major commercial websites and servers, but also that of the United States government. Distributed.net set up servers and provides software for participants around the world to help find the secret key and break RSA's 64-bit encryption. Distributed.net has been involved in other RSA challenges in the past, mainly to help prove to the United States government that security standards aren't high enough, and, with enough computer power and time, even a complicated encryption code can be broken.

Latest Bluetooth Exploit 2010

Guys, this is a tool i've been working on for a while. It's not yet completed but still it works in ways that i know will blow off your minds. The tool is Blue_ron. Here is the Demo video.

http://www.youtube.com/watch?v=GsLw6QYK3cY

http://www.youtube.com/watch?v=Pn5oDRFrqmQ

WARNING: A couple of websites are claiming to be selling this tool but the fact is that no release of the tool has been yet authenticated to the public! I will post the link to soldierx.com when we are final. Don't be fooled!

Plaintext and SSL Password Sniffing

I posted up a short tutorial on sniffing plain text and SSL encrypted passwords for anyone interested.

http://www.soldierx.com/tutorials/Sniffing-Various-Passwords-MITM-DSNIFF...

As I mention at the bottom of the tut, you can apply arp spoofing for various MITM attacks.

Syndicate content