+

Tagged With / 'password'

July 10, 2013

Magazine News admin Comments Off
Hakin9_05_2013

13 Steps To Develop Your Own Hacking Tool With Hakin9′s Tutorials

Dear Readers, Welcome to the next edition of Hakin9. In this issue we focus on Offensive Programming. Many of you probably wonder how to define this popular term. Honestly, it is as broad as the topics of the articles put together in this issue. Their content should be an accurate answer to such wondering. So […]

Read more

April 18, 2013

Magazine News admin Comments Off
Hakin9_starter_kit_01_2013-1

Basic Articles on Hacking for Beginners – Free Download

Full version of the issue with 18 complete articles can be found here . EXPLOITING SOFTWARE A Quick Reference To Metasploit Framework By Abhinav Singh, the author of “Metasploit penetration testing cookbook,” a contributor of SecurityXploded community Metasploit is currently the most widely used and recommended penetration testing framework. The reason which makes metasploit so […]

Read more

November 27, 2011


U.S. government deny reports of water utility cyber attack

The U.S government (FBI and DHS) claim that no cyber attack whether from the US mainland or overseas actually happened as repored in the media last week. The media say that ‘attackers’ were able to burn out the pump after accessing its industrial control system (SCADA). The hack was released by Applied Control Systems who […]

Read more

November 21, 2011

Password, What Password?

Exploiting Software 03/11Password, What Password?

Malware Analisys for Windows Systems Administrators Using Sysinternal Tools By Dennis Distler Today administrators deal with malware infections almost daily. Often malware is customized for specific organizations, departments in an organization, and even individuals in the organization. This type of malware typically is not identified by anti-virus products, and it is up to the administrator […]

Read more

October 31, 2011

Hacking Data

Hacking Data 11/11

Latest News From IT Security World By Schuyler Dorsey, eLearnSecurity i ID Theft Protect As usual specialists from companies eLearn Security and ID Theft protect will share with us latest news from IT security world. Read it to up-date yourself. Secure Log Server With Rsyslog By Leonardo Neves Bernardo This article will discuss how to […]

Read more

October 27, 2011


Sixty popular Swedish websites hacked by ‘sc3a5j’

Sixty popular Swedish websites have been identified as potential targets in a massive password hacking incident in Sweden. A leading Swedish Democrat had his Twitter account hacked. The hacker(s) preceded to tweet email addresses and MD5 hashes of passwords of top Swedish journalists. In addition to this databreach, popular Swedish blogging portal ‘Bloggtoppen’ says that […]

Read more

October 24, 2011

Exploiting Software 02/11 - Exploit Format Strings with Python

Exploiting Software 02/11 Exploit format Strings with Python

Cracking Java Applications Using AOP Exploits (part 2) By Daniel Drozdzewski AOP has been used in the domain of Software Security before. Its use was mainly for validation, auditing and authorization purposes, which in turn improve software security as a whole. Those crosscutting concerns are being woven into the existing software after the fully functional […]

Read more

October 17, 2011

Hakin9 Botnet

Hakin9 Extra – Botnet 05/2011

A study of a Botnet creation process and the impact of a DDoS attack against a web server by Stavros N. Shaeles and Ioannis D. Psaroudakis Over the following paragraphs we are going to describe in steps, the procedure of setting up a botnet in order to execute our DDoS attack. The purpose of building […]

Read more

October 7, 2011


nVidia GeForce GPU cracks six character password in four seconds

An nVidia GeForce GT220 graphics card, which costs about 30 GBP, is capable of cracking strong passwords in a matter of hours. Security experts were able to crack a  6 character password in 4 seconds, a 7 character password in less than 5 minutes, and 8 character password in four hours. It appears people have […]

Read more

October 7, 2011


SpyEye banking Trojan uses SMS hijacking feature

SpyEye has been observed trying to trick users into reassigning their cellphone numbers to receive one-time passwords (OTP) from their banks by SMS. The social engineering scam (assuming SpyEye has already infected the target PC) is found on fraudulent pages injected into a users online banking session that falsely claim they have been assigned a […]

Read more

September 29, 2011


UKChatterbox IRC website personal data stolen

Popular UK IRC service UKChatterbox has commenced advising users to change their passwords following a databreach which culminated in compromised data being stolen. Users had been reporting outages which were originally put down to maintenance upgrades – however it has become clear that the reason wasn’t maintenance but a hack attack. UKChatterbox has been the […]

Read more

September 28, 2011

Hack Apple

Hack Apple 10/11

In Brief By Schuyler Dorsey, eLearnSecurity i ID Theft Protect As usual specialists from companies eLearn Security and ID Theft protect will share with us latest news from IT security world. Read it to up-date yourself. Hacking Tools on iOS By Alexandre Lacan One day I was asked if the iPhone is a good phone. […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa