Sunday, 06.23.2024, 11:27 PM

Ethical Hacking - By Chintan Gurjar

Site menu
«  June 2024  »
Our poll
Rate my site
Total of answers: 171

Main » Entries archive
Red Hat announced the general availability of Red Hat Enterprise Linux 6 which delivers extensive new features.

Red Hat Enterprise Linux 6 includes hundreds of technical feature enhancements and additions that offer customers a significant technology leap over marketplace alternatives. It offers:
Views: 1120 | Added by: handsome_devil | Date: 11.11.2010 | Comments (0)

Views: 1956 | Added by: handsome_devil | Date: 11.11.2010 | Comments (0)


I noticed a strange behaviour. A lot of people were into cracking WEP, but still had a lot of questions on WPA. After these findings, I decided to just write my own tutorial :-)

If you look at the attacks closely, you'd think WPA was very easy to crack. Well, some people say it is, some don't agree. The fact is, that if the password is in some sort of dictionary, the password can be cracked. you'll need a 4-way handshake from a client connecting to an AP. The 4way handshake holds an encrypted algorithm which can be cracked by dictionary attack. you'll need a huge list and some luck that the password is in the list, or you can make a personal list created with a password tool of your choice (like john), which will not be discussed in this tutorial ;-).For this tutorial, of course I' ... Read more »
Views: 1245 | Added by: handsome_devil | Date: 11.11.2010 | Comments (1)

For more info
... Read more »
Views: 1035 | Added by: handsome_devil | Date: 11.11.2010 | Comments (0)

The Hacker’s Underground 
Handbook starts off with the very basics with topics like programming and Linux. It then moves on to introduce and teach the topics of

... Read more »

Views: 908 | Added by: handsome_devil | Date: 11.11.2010 | Comments (0)

Malware, short for malicious software, is software designed to secretly access a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.

The best-known types of malware, viruses and worms, are known for the manner in which they spread, rather than any other particular behavior. The term computer virus is used for a program that has infected some executable software and that causes that when run, spread the virus to other executables. Viruses may also contain a payload that performs other actions, often malicious. A worm, on the other hand, is a program that actively transmits its ... Read more »
Views: 1282 | Added by: handsome_devil | Date: 11.11.2010 | Comments (0)

Mitchell L. Frost, age 23, admitted to initiating Denial of Service attacks on web servers hosting websites for several conservative figures and for operating a botnet. He also admitted to initiating a DDoS on the University of Akron which cost the University $10,000 to restore network services. 30 months in prison... watch your cornhole, Mitchell.

Frost admitted using the compromised machines to spread malware and harvest data from the compromised systems, including user names, passwords, credit card numbers, and ... Read more »
Views: 887 | Added by: handsome_devil | Date: 11.11.2010 | Comments (0)

Wanted by Google: Bounty-hunting hackers who can find security vulnerabilities in popular Web apps.

For security researchers who find flaws in Internet services like Gmail, Blogger and YouTube, Google will reward $500 or more per bug. Vulnerabilities that are "severe or unusually clever" pay up to $3,133.70. Optionally, benevolent hackers can also donate their rewards to charity, in which case Google will match the winnings at its discretion.< ... Read more »
Views: 1310 | Added by: handsome_devil | Date: 11.11.2010 | Comments (0)

« 1 2 ... 10 11 12 13 »