Wednesday, 7. March 2012
DIY USB password generator
Joonas Pihlajamaa a programmer who solved this issue by using a USB HID stick that types a password stored in EEPROM, The device may also generate a new password with 10 characters by only typing the CAPS button which will help in getting a new password in a fast way without need to remember it. The programmer used an old 512 MB flash drive.



Download Source
http://codeandlife.com/data/usb_passgen.zip

Permalink

 


Friday, 24. February 2012
Manual Code Injection
Things you will need:

1. OllyDbg v1.10
2. Notepad.exe

Info
http://pastebin.com/n0fgJ1YL

by
Huxley

Permalink

 


Monday, 13. February 2012
Wpa 2 Networks Key Without Bruteforce


Commands
http://pastebin.com/n25dyQQN

Download Files
http://technicdynamic.com/wp-content/uploads/2012/01/verizon.zip

The files can be copied and pasted on to the /var/www/ folder. Once that’s done, start Apache and MySQL from the services menu, and go type localhost to test it in a web browser.

Login to MySQL:
mysql -u root -p
Note: Default backtrack user/pass are root/toor
Create the database:
create database wpa2;
use wpa2;
create table content(key1 VARCHAR(64), key2 VARCHAR(64));

Permalink

 


Thursday, 12. January 2012
Become a Metasploit Expert l
Metasploit Framework Expert Certification DVD
The DVD contains over 10+ solid hours of how to get started using Metasploit, Vulnerability assessment and hacking, and finally basics of Exploit Research with it! The course and online labs in the cloud are still running at the promotional pricing and we highly recommend you have a look.
Info:
http://securitytube-training.com/certifications/securitytube-metasploit-framework-expert/
Download:
http://dvd.securitytube.net/SMFE-Community.zip


SMFE Part 1 from Vivek Ramachandran on Vimeo.

SecurityTube Metasploit Framework Expert Part 2 from Vivek Ramachandran on Vimeo.

SecurityTube Metasploit Framework Expert (SMFE) Part 3 from Vivek Ramachandran on Vimeo.

SMFE Part 4 from Vivek Ramachandran on Vimeo.

Part 5 from Vivek Ramachandran on Vimeo.

Part 6 from Vivek Ramachandran on Vimeo.

Part 7 from Vivek Ramachandran on Vimeo.

Part 8 from Vivek Ramachandran on Vimeo.

Part 9 from Vivek Ramachandran on Vimeo.

Part 10 from Vivek Ramachandran on Vimeo.

Part 11 from Vivek Ramachandran on Vimeo.

Part 12 from Vivek Ramachandran on Vimeo.

Part 13 from Vivek Ramachandran on Vimeo.

Part 14 from Vivek Ramachandran on Vimeo.

Part 15 from Vivek Ramachandran on Vimeo.

Part 16 from Vivek Ramachandran on Vimeo.

Part 17 - Broadband from Vivek Ramachandran on Vimeo.

Part 18 - Broadband from Vivek Ramachandran on Vimeo.

Part 19 - Broadband from Vivek Ramachandran on Vimeo.

19A - Broadband from Vivek Ramachandran on Vimeo.

20 from Vivek Ramachandran on Vimeo.

21 from Vivek Ramachandran on Vimeo.

22 - Broadband from Vivek Ramachandran on Vimeo.

23 - Broadband from Vivek Ramachandran on Vimeo.

24 - Broadband from Vivek Ramachandran on Vimeo.

25 - Broadband from Vivek Ramachandran on Vimeo.

26 from Vivek Ramachandran on Vimeo.

Permalink

 


Monday, 19. December 2011
aidSQL SQL Injection penetration testing tool
This is a video showing you howto effecitvely audit your website with aidsql



by
Lynxsec

Permalink

 


Friday, 9. December 2011
Capturing A Wpa2 4-Way Handshake, Cracking It, Using Armitage To Exploit




by
Backtrack5Tutorials

Permalink

 


Thursday, 24. November 2011
Sql Injection In Bt5 R1 With Sqlmap.Py

SQL Injection in BT5 R1 from Anti-CyberMan on Vimeo.

Permalink

 


Saturday, 5. November 2011
How to use latest exploits from milw0rm


by
br194nt3

Permalink

 


Wednesday, 19. October 2011
How to Poison Ivy server compatible with Win-7 32bit
Load server Poison Ivy in OllyDBG, go to the address 401200, and do as follows.

Before


After


by
qolyx

Poison Ivy 2.3.2
http://securityxploit.blogger.de/stories/1852045/

Permalink

 


Monday, 10. October 2011
Social Engineering with SET
It is a useful social engineering tool by David (ReL1k). It can be used to perform a number of Social Engineering attacks with minimal effort. SET can be used with Metasploit to additionally perform metasploit's powerful post exploitation. This tool can be accessed through web interface or command line.

Download PDF
http://www.garage4hackers.com/attachment.php?attachmentid=97&d=1314862575

Download
http://securityxploit.blogger.de/stories/1864853/

Permalink