Пропускане към основното съдържание

Публикации

Показват се публикации от 2014

SSL Stripping & Sniffing HTTPS LOGIN internet explorer 11 windows 8.1 sucks (SSLStrip)

WARNING: THIS IS COMPUTER CRIME, DO NOT DO THIS! THIS IS ONLY FOR EDUCATION. Method Performing a ‘Man In The Middle’ attack therefore all the traffic flows through the attacker. Picks out HTTP traffic from port 80 and then packet redirection / forwarding onto a different port. SSLStrip is then listening on that port and removes the SSL connection before passing it back to the user, ettercap then picks out the username & password. Stripping SSL & Sniffing HTTPS_internet... by nu11secur1ty WARNING: DO NOT USE INTERNET EXPLORER! Need to install: SSLSrip arpspoof (DSniff) Ettercap Using tools: netdiscover arpspoof (DSniff) ettercap sslstrip

Perl Language "Education"

WPA WPA2 aircrack bruteforce using dictionary

Why should use WPA/WPA2 encryption?!!! In order to protect your data from snooping or prying eyes, you should encrypt, or scramble, it so that nobody else can read it. Most recent wireless equipment comes with both WEP (wired equivalent privacy) and WPA (wifi protected access) encryption schemes that you can enable. WEP was the encryption scheme included with the first generation of wireless networking equipment. It was found to contain some serious flaws which make it relatively easy to crack, or break into, so it is not the best form of security for your wireless network. WPA was later rolled out to provide significantly stronger wireless data encryption than WEP. But, in order to use WPA, all of the devices communicating on the network need to be configured for WPA. If any of the devices in the chain of communication are configured for WEP, the WPA devices will typically fall back to the lesser encryption so that all of the devices can still communicate. Refer to the owner's...

Hey users, better to know it.../ Здравейте, Потребители трябва да знаете това!

Личните данни в социалните мрежи отново са под заплаха.Този път тя идва от Фейсбук. От 1 януари догодина мрежата ще предоставя на трети лица информация от профилите на потребителите си. Наред със стандартните статуси и снимки, ползвателите на социалните мрежи държат в профила си и данни за своята месторабота, телефонни номера, ценни съобщения до близки приятели. Някои пазят дори конфиденциална информация за плащания и банкови сметки, което ги прави уязвими. Броят на българите, които използват Фейсбук наброява 2,5 милиона души. Всеки от тях в различна степен доброволно е изложил живота си на показ. Статистиката показва, че 25% от потребителите по света не познават настройките за поверителност във Фейсбук. „Преди всичко „Фейсбук” е корпорация и тя използва данните на своите потребители както поиска”, коментира Рой Себастиан Хил, редактор в Novanews.bg. Той пояснява, че ако изпратим ЕГН или банкова сметка на наш близък през модула за съобщения, вече сме в капана. Причината е, че мина...

Something good for read, if you want to learn for networks and their structures

websiteblocker stop facebook_parental control

NOTE! This script is for windows =). THIS TOOL IS ONLY AND SPECIAL FOR PARENTS =) You can stop any website if you want. You just have to write right source servers of this site into a program. When start the program as administrator! You just follow the instruction! websiteblocker stop facebook parental control Download video Download script

Information!

Offensive Security Introduces Kali Linux Free All-in-One Solution for Professional Security Auditing Popular BackTrack Linux Evolves Into Mature, Enterprise-Ready Penetration Testing Toolkit. Black Hat Europe, Amsterdam – March 13 – Offensive Security today announced the availability of Kali Linux , the evolution of its popular BackTrack Linux , a free security auditing operating system and toolkit. Showcased at Black Hat Europe in Amsterdam, Kali Linux incorporates more than 300 penetration testing and security auditing programs with a Linux operating system, delivering an all-in-one solution that enables IT administrators and security professionals to test the effectiveness of risk mitigation strategies. “For IT professionals, an experiment is worth a thousand theories. Applied to security, it means that simulating attacks to assess the defenses protecting your organization is the only sure way to understand their effectiveness and the impact of an attack,” said Mati Aharo...

Offensive-security-wireless-attacks & Attack WPS WiFi protected WPA WPA2_script

WARNING! THIS IS A COMPUTER CRIME This is a brute force attack against an access point’s WiFi Protected Setup pin number. Once the WPS pin is found, the WPA PSK can be recovered and alternately the AP’s wireless settings can be reconfigured. Reaver-WPS targets the external registrar functionality mandated by the WiFi Protected Setup specification. Access points will provide authenticated registrars with their current wireless configuration (including the WPA PSK), and also accept a new configuration from the registrar. In order to authenticate as a registrar, the registrar must prove its knowledge of the AP’s 8-digit pin number. Registrars may authenticate themselves to an AP at any time without any user interaction. Because the WPS protocol is conducted over EAP, the registrar need only be associated with the AP and does not need any prior knowledge of the wireless encryption or configuration. Reaver-WPS performs a brute force atta...

install BT4 VirtualBox

BUY THE VIDEO