background preloader

Penetration Testing and Vulnerability Analysis - Home

Penetration Testing and Vulnerability Analysis - Home

Know the Trade Your IT Security Information Portal | CISSP/CEH/CISA/Hacker and Penetration Testing Specialist ZenK-Security :: Communauté de sécurité informatique Infinity Exists I Got My Computer Back! June 4th, 2009 by Patchy It’s been several years,… but finally Patchy and his computer are reunited at last Download Here Posted in News, Vblog | 9 Comments Email Injection June 2nd, 2009 by Now that I finally got rid of WP-Forum, I can show you guys an Email Injection flaw that existed in that forum. Posted in Vblog | No Comments Infinity Exists Updates!! Nox and I haven’t made any new Full Disclosure episodes in a while because we have been busy with school. No Comments Underground – Local File Inclusion May 27th, 2009 by Ground Zero’s Underground Video demonstrates how to use Local File Inclusion (LFI). If you would like to submit a video to Infinity Exists Underground send an email describing your video to underground@infinityexists.com Posted in Underground | No Comments Underground – Windows Privilege Escalation May 26th, 2009 by In this Underground Video, Crash Overron explains a simple way to escalate privileges in Windows XP. 4 Comments Jerry Sanders Design Competition

Index - Accueil 2600: The Hacker Quarterly [HowTo] Cracker un réseau WPA2 - Accueil Salut Comme vous le savez, je ne suis ni programmeur de renommée ni hacker recherché. Cependant, les attaques contre les réseaux Wi-Fi, ça me parle. Je vous montre donc quelques résultats et informations que j'ai récoltés au fil du temps. Tout se passe sous BackTrack (version 5 R3). On initialise d'abord l'interface wlan0: Code : ifconfig wlan0 up airmon-ng start wlan0 airmon-ng stop mon0 Puis, on se renseigne sur les réseaux environnants: On obtient alors une liste de tous les AP ainsi que les terminaux qui y sont connectés: (j'ai masqué certaines informations avec des $$) BSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID 00:$$:E3:$$:64:$$ -26 183 15982 0 6 54e. Le but étant d'obtenir le handshake lors d'une connexion d'un terminal à l'AP, on optera pour une surveillance des réseaux "bondés". On utilise toujours airodump, mais cette fois on restreint son champ d'analyse. airodump-ng -c 1 --bssid 64:$$:D7:$$:47:$$ -w psk wlan0 On se retrouve alors avec ceci: Aircrack-ng 1.1 r2178

Hacking Conference - The Hacker Community's Foremost So HellBound Hackers Demolishing Ankit Fadia v 0.01 « Sandip's Blog We all know who Ankit Fadia is. He is self proclaimed child prodigy in ‘hacking’ , a self proclaimed ‘world famous’ expert is computer security and digital intelligence consultant (digital intelligence? Does he mean AI. I never heard this term getting used anywhere in print other than by Mr. Fadia though I agree its a perfectly meaningful amalgamation of the two official sounding words ‘digital’ and ‘intelligence’) . However that picture of Ankit Fadia is very likely untrue and let me present a few findings so that you can decide for yourself. So lets begin with his profile on . 1.His profile on a.Milestones in Ankit Fadia’s Life AGE 14 Published his first book titled The Unofficial Guide to Ethical Hacking which became an instant bestseller worldwide, sold 500 000 copies and was translated into 11 languages. My opinion: Have you read that book? c. Best selling books? 2. 3. 4. 5.

Related: