background preloader

Ophcrack

Ophcrack
What is ophcrack? Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms. Features: » Runs on Windows, Linux/Unix, Mac OS X, ... » Cracks LM and NTLM hashes. » Free tables available for Windows XP and Vista/7. » Brute-force module for simple passwords. » Audit mode and CSV export. » Real-time graphs to analyze the passwords. » LiveCD available to simplify the cracking. » Dumps and loads hashes from encrypted SAM recovered from a Windows partition. » Free and open source software (GPL).

http://ophcrack.sourceforge.net/

Cain & Abel Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.

Malicious Linux Commands - From (This article was originally published in Ubuntu Forums but was removed there. Ubuntuguide feels that knowledge about these risks is more important than any misguided attempts to "protect the public" by hiding their potential dangers or protect the (K)Ubuntu/Linux image. The original article has therefore been re-created (and subsequently edited) here.) ATTENTION: It is worthwhile to have some basic awareness about malicious commands in Linux. The Infection File Popularity Contest - SpywareGuide Greynets Bl Ever wondered exactly how people who enjoy putting malicious files into the wide blue yonder ensure their bundles of joy are as attractive as possible to those who would happily download them? Well, I came across this program today and thought it was worth looking into. It dips into what's hot and current in the world of free downloads then uses that to ensnare as many potential victims as possible. How do they do it?

Ping Tunnel Using ptunnel Client: ./ptunnel -p <proxy address> -lp <listen port> -da <destination address> -dp <destination port> [-c <network device>] [-v <verbosity>] [-f <logfile>] [-u] [-x password]Proxy: ./ptunnel [-c <network device>] [-v <verbosity>] [-f <logfile>] [-u] [-x password] The -p switch sets the address of the host on which the proxy is running. iwiDarwin iwi_darwin was ported from Linux drivers made by Intel®. This code includes derivations from the BSD and Linux drivers and is therefore licensed under GPL2. Donations should be done in mercurysquad project New drivers If you know of other linux wireless drivers for mini-pci-express cards you like to see working in mac os x post the link/request in the Issues section

How to hide files in JPEG pictures If you’re looking to hide files on your PC hard drive, you may have read about ways to encrypt folders or change the attributes on a file so that they cannot be accessed by prying eyes. However, a lot of times hiding files or folders in that way requires that you install some sort of software on your computer, which could then be spotted by someone else. I’ve actually written quite a few articles on how you can hide files and folders in Windows XP and Vista before, but here I’m going to show you a new way to hide files that is very counter-intuitive and therefore pretty safe! Using a simple trick in Windows, you can actually hide a file inside of the JPG picture file! You can actually hide any type of file inside of an image file, including txt, exe, mp3, avi, or whatever else. Not only that, you can actually store many files inside of single JPG file, not just one!

Google Dorks cache: If you include other words in the query, Google will highlight those words within the cached document. For instance, [cache:www.google.com web] will show the cached content with the word “web” highlighted. This functionality is also accessible by clicking on the “Cached” link on Google’s main results page. We Were Hacked! 8 Tips From A Hacking Victim For Minimizing Your Risk :... - StumbleUpon Think you're safe from a cyberattack just because you're a small biz? Think again. Here's how to prevent a hacking. July 20, 2011 Computer hacking has become front-page news lately, but many small business owners assume that because they’re small potatoes, have a firewall, and use anti-virus software they’re immune to a cyber attack. They're dangerously wrong.

Related:  visualvidyaPasswordseguridadHackmouhametwane