Hacking

The seedier side of all of the above forums.

Rainbow tables vs. Traditional John the Ripper style

I'm kind of leaning toward the fact that Rainbow table has a good methodology in reference to when you brute force something the application your using to do so has to create a hash and then compare it to the one you're trying to crack.
And if I am correct, which I may not be, the rainbow tables are pre-computed hashes, so common sense tells us that if the hash is already computed that's taking part of the cpu processing power out of the equation because it's already been done.

Hacking MySpace accounts

Hey all, schiz0id here!

I just wanted everybody to know that I finished writing my latest tutorial on how to hack into MySpace accounts.

Here's the link: http://www.elite-hackers.com/?p=myspace

Let me know what you all think!

site map

Is there a tool like accessdiver that looks for hiden directories on a site as accessdiver is relatively limited to 50 i think
for those wonder what I am asking I'm looking for a tool able to pick up accessable directories such as \~temp or \htaccess etc

OpenId with Phone Authentication

https://www.myopenid.com/about_callverifid

Has anyone seen this before? It's an interesting enough idea. Not exactly the most secure.. but interesting still.

EVE


I've just been wondering if not a DDoS what else can be done to bring down EVE's network?

Covert Channel Tutorial

(Note: I have tons more that I could write if any are interested. Rat or whoever - feel free to stick on the site if you like it.)

License: MIT (I don't really care what you do with this)

*********************************
* Covert Channels *
* Author: Kayin *
* Date: 10-10-08 *
*********************************

Introduction
------------
Security. We all know what "security" entails. But to design a "secure" system,
whether that be an application, a process, a phone line, or even a door locking

Hash Extractors

Does anyone know of a hash extractor for facebook?

Rainbow Tables Anyone?

after needing to crack a hash (usually I ask how not do it for me) fadi indicated me towards rainbow tables thought some of you would appreciate this:
http://www.ethicalhacker.net/content/view/94/24/ <<< tut here
http://www.antsight.com/zsl/rainbowcrack/ <<< tool here

NetTools 5

Net Tools 5.0

Download Here:
http://www.mabsoft.com/NetTools5.0.70.zip<=-

1) IP Address Scanner
2) IP Calculator
3) IP Converter
4) Port Listener
5) Port Scanner
6) Ping
7) NetStat (2 ways)
Cool Trace Route (2 ways)
9) TCP/IP Configuration
10) Online - Offline Checker
11) Resolve Host & IP
12) Time Sync
13) Whois & MX Lookup
14) Connect0r
15) Connection Analysator and protector
16) Net Sender
17) E-mail seeker
18) Net Pager
19) Active and Passive port scanner
20) Spoofer
21) Hack Trapper
22) HTTP flooder (DoS)
23) Mass Website Visiter
24) Advanced Port Scanner

Syndicate content