Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Topics - Axon

Pages: 1 ... 3 4 [5] 6 7 ... 34
61
Security Tools / WAIDPS
« on: June 07, 2014, 02:12:51 pm »
WAIDPS (Wireless Auditing, Intrusion Detection and Prevention System) is an open source wireless swissknife written in Python and work on Linux environment. This is a multipurpose tools designed for audit (penetration testing) networks, detect wireless intrusion (WEP/WPA/WPS attacks) and also intrusion prevention (stopping station from associating to access point). Apart from these, it will harvest all WiFi information in the surrounding and store in databases. This will be useful when it comes to auditing a network if the access point is ‘MAC filtered’ or ‘hidden SSID’ and there isn’t any existing client at that moment.
https://github.com/SYWorks/waidps

64
Android / [Q] Android mac changing
« on: June 04, 2014, 04:48:00 am »
Is there a practical method of changing mac address on android OS, I've tried several methods and apps but to no avail . You lose wifi connectivity as soon as you change the mac address, I've read that the best way is to change the first three parts of the mac address because the last three are reserved for the manufacturer, I've tried change the first three and the last three independently and nothing happened. Any help would appreciated?

65
Found it on the Webs / Cracking complex passwords
« on: June 03, 2014, 01:00:54 am »
This is a good method of cracking complex passwords using qwerty-gen, which generates keyboard sequences according to a given layout and creates dictionary files for bruteforcing. Although this is not the ultimate passwords cracking method, but it's useful against some complex ones.
http://xangosec.blogspot.com/2014/01/cracking-more-passwords-qwerty-gen.html

66
Found it on the Webs / Stealing Passwords Every Time They Change
« on: May 31, 2014, 10:26:42 pm »
Here's a good way to steal passwords from a system no matter how complex they are and in clear text. Interesting to read.
http://www.room362.com/blog/2013/09/11/stealing-passwords-every-time-they-change/

67
Found it on the Webs / Amazing street hack
« on: May 30, 2014, 02:15:56 pm »
It's a promotion video for watch dogs. I love how they did it.
https://www.youtube.com/watch?v=1hpU_Neg1KA

On the other hand, the game has been released, has anyone tried it yet.

68
Tutorials / Hacking automotive networks and control units
« on: May 25, 2014, 11:43:50 pm »
This is something I've been looking for.

Quote
Previous research has shown that it is possible for an attacker to get remote code execution on the electronic control units (ECU) in automotive vehicles via various interfaces such as the Bluetooth interface and the telematics unit. This paper aims to expand on the ideas of what such an attacker could do to influence the behavior of the vehicle after that type of attack. In particular, we demonstrate how on two different vehicles that in some circumstances we are able to control the steering, braking, acceleration and display. We also propose a mechanism to detect these kinds of attacks. In this paper we release all technical information needed to reproduce and understand the issues involved including source code and a description of necessary hardware.

http://upload.evilzone.org/download.php?id=5689142&type=rar
101 pages, very interesting

69
Tutorials / Whatsapp stealer
« on: May 24, 2014, 04:34:14 pm »
This is a 12 page walkthrough on how to make a fake apk to grap whatsapp database, decrypt the crypt5 file and read the messages.
http://upload.evilzone.org/download.php?id=5313095&type=zip

70
Articles / New algorithm shakes up cryptography
« on: May 17, 2014, 12:59:17 pm »
May 15, 2014
Researchers have solved one aspect of the discrete logarithm problem. This is considered to be one of the 'holy grails' of algorithmic number theory, on which the security of many cryptographic systems used today is based. They have devised a new algorithm that calls into question the security of one variant of this problem, which has been closely studied since 1976.

http://www.sciencedaily.com/releases/2014/05/140515163739.htm

72
Articles / Motorola patents e-tattoo that can read your thoughts
« on: May 09, 2014, 10:11:51 pm »
Motorola patents e-tattoo that can read your thoughts by listening to unvocalized words in your throat

Quote
Imagine trying to patent the smartphone, or for that matter, the tattoo. Any company that could swing that, could probably also patent the fork and knife. Incredibly, a new application from Google-owned Motorola Mobility seeks a patent not for any particular utensil, but rather, for setting the table. In other words, if you have an electronic smart tattoo, and want it to speak to your mobile communications device, you may soon be able to do it in spades, but you will have to do it Google style.
http://www.extremetech.com/extreme/171992-motorola-patents-e-tattoo-that-can-read-your-thoughts-by-listening-to-unvocalized-words-in-your-throat

73
eBooks / Attacking WPA/WPA2 enterprise networks
« on: May 04, 2014, 09:31:06 pm »
This guide will discuss some of the security flaws regarding wireless networks implementing WPA/WPA enterprise authentication as well as ways to exploit these weaknesses

Credits to the author:W1red
http://upload.evilzone.org/download.php?id=2325335&type=rar

74
Security Tools / EyeWitness
« on: May 01, 2014, 09:38:52 pm »
EyeWitness is a rapid web application triage tool that is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.

https://github.com/ChrisTruncer/EyeWitness

75
Security Tools / Radiography
« on: April 22, 2014, 04:01:39 pm »
Radiography is a forensic tool which grabs as much information as possible from a Windows system.

Its checks:

Registry keys related to startup process
Registry keys with Internet Explorer settings
System Accounts and properties
Startup files
System services
Hosts file contents
TaskScheduler tasks
Loaded System Drivers
NetBios Shares
Hidden Windows
System processes running (and their location if possible)
Network information (Open connections, listening ports ...)


http://www.security-projects.com/?RadioGraPhy
Note:
Website contains other interesting security tools, worth checking.

Pages: 1 ... 3 4 [5] 6 7 ... 34


Intern0t SoldierX SecurityOverride programisiai
Want to be here? Contact Ande, Factionwars or Kulverstukas on the forum or at IRC.