background preloader

HellBound Hackers

Love Thy Neighbor but hack his Wi-Fi My neighbor works for a fortune 500 company. I don’t know what he does exactly but he got a 10mbps internet connection attached to his WiFi router. He is mostly not home till late in the evening. so all this bandwidth sits idle all day. such a waste! I did try to connect to this router many times but it kept asking for a password. And, by the way, I am his neighbor too… and he even won’t share his Wi-Fi with me.. what and A*s. So, My quest for hacking my neighbor’s Wi-Fi (For Educational Purpose Only) has begun, I have done some initial research and found that I would need following tools CommView for Wi-FiWEP Key RecoveryAircrack-NG Let’ me find them on some forums etc… Install Commview, then paste the included “cv.exe” to the directory you installed it to (c:program filescommviewwifi)Open commview and install the commview drivers to a card.

.:: Phrack Magazine ::. A place to learn about computer software, security and games, popular physics, life, 3d art, models, and more 45 Free Online Computer Science Courses Missed lectures or hate teachers? Or want to study computer science courses without going to university? … You can study anytime anywhere because there are number of free online computer science courses available on internet that are very interactive. Here is the list of 45 free online computer science courses that are designed by teaching experts from best universities of the world (almost the whole graduation!). 1. Complete set of course materials. 2. This course is the natural successor to Programming Methodology and covers such advanced programming topics as recursion, algorithmic analysis, and data abstraction using the C++ programming language, which is similar to both C and Java. 3. Advanced memory management features of C and C++; the differences between imperative and object-oriented paradigms. 4. The purpose of this course is to introduce you to basics of modeling, design, planning, and control of robot systems. 5. 6. 7. 8. 9. 10. Continuation of Convex Optimization I. 11. 12.

Know the Trade How to use Google for Hacking Google serves almost 80 percent of all the search queries on the Internet, proving itself as the most popular search engine. However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post, you will find the information on how to use Google for exploiting security vulnerabilities that exists within many websites. The following are some of the ways to use Google for hacking: 1. There exists many security cameras that are used for monitoring places like parking lots, college campus, road traffic etc. inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. intitle:”Live View / – AXIS” 2. intitle:”curriculum vitae” “phone * * *” “address *” “e-mail” 3. “?

JavaScript, JavaScript... | by Angus Croll 99 Resources to Research & Mine the Invisible Web College researchers often need more than Google and Wikipedia to get the job done. To find what you're looking for, it may be necessary to tap into the invisible web, the sites that don't get indexed by broad search engines. The following resources were designed to help you do just that, offering specialized search engines, directories, and more places to find the complex and obscure. Search Engines Whether you're looking for specific science research or business data, these search engines will point you in the right direction. Turbo10: On Turbo10, you'll be able to search more than 800 deep web search engines at a time. Databases Tap into these databases to access government information, business data, demographics, and beyond. GPOAccess: If you're looking for US government information, tap into this tool that searches multiple databases at a time. Catalogs If you're looking for something specific, but just don't know where to find it, these catalogs will offer some assistance. Directories

Paros Proxy How to Crack a Wi-Fi Network. | Arrow Webzine 1.Back Track Today we’re going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on. Dozens of tutorials on how to crack WEP are already all over the internet using this method. Unless you’re a computer security and networking ninja, chances are you don’t have all the tools on hand to get this job done. * A compatible wireless adapter—This is the biggest requirement. * A BackTrack 3 Live CD. * A nearby WEP-enabled Wi-Fi network. * Patience with the command line. To crack WEP, you’ll need to launch Konsole, BackTrack’s built-in command line. First run the following to get a list of your network interfaces: The only one I’ve got there is labeled ra0. Now, run the following four commands. {*style:<i>airmon-ng stop (interface) ifconfig (interface) down macchanger –mac 00:11:22:33:44:55 (interface) airmon-ng start (interface) </i>*} Now it’s time to pick your network. To see a list of wireless networks around you. Like I said, hit Ctrl+C to stop this listing. </b>*}

Related: