AddThis Social Bookmark Button

Most Read!


Warning: Creating default object from empty value in /home/rjacksix/dc406.com/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /home/rjacksix/dc406.com/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /home/rjacksix/dc406.com/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /home/rjacksix/dc406.com/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /home/rjacksix/dc406.com/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /home/rjacksix/dc406.com/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /home/rjacksix/dc406.com/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /home/rjacksix/dc406.com/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /home/rjacksix/dc406.com/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /home/rjacksix/dc406.com/modules/mod_mostread/helper.php on line 79

l337 Reading

DEFCON 406

That's the Way the Fortune Cookie Crumbles

PDFPrintEmail


AddThis Social Bookmark Button

Wanna see APT?

It is a threat actor, not a technique.

The attackers are advanced, but they will use the most common of hacks in more than 98% of their penetrations according to Mandiant.

One problem...they forgot to turn off the camera.

http://www.youtube.com/watch?v=L_Wu1HlZbBk&feature=youtu.be&t=36s

BTW: 

 

 

nslookup 138.26.72.17
Server: 8.8.8.8
Address: 8.8.8.8#53
Non-authoritative answer:
17.72.26.138.in-addr.arpa name = dali.chem.uab.edu.

We'll I'll be...

Lookie there Oppie!

Check out Eric's great post too

 

http://www.ericjhuber.com/2011/08/advanced-persistent-threat.html?m=1

 

Written by DC 406 Webmaster Wednesday, 24 August 2011 22:43

 

John the Ripper in Metasploit

PDFPrintEmail


AddThis Social Bookmark Button

A nice little tutorial on the using John the Ripper crack fast module in Metasploit.

Now you can crack hashes as you scoop them without leaving the MSG.

http://eromang.zataz.com/2011/07/12/built-in-john-the-ripper-jtr_crack_fast-into-metasploit/

Written by DC 406 Webmaster Saturday, 16 July 2011 14:05

   

THC Femto Hack

PDFPrintEmail


AddThis Social Bookmark Button

This is truly hacking.

THC has an explanation of how to hack a Vodafone Femto cell.

This is for EDUCATIONAL Purposes only...srsly...your mileage may vary.

http://wiki.thc.org/vodafone

Written by DC 406 Webmaster Wednesday, 13 July 2011 23:45

   

Honeypot Tutorial

PDFPrintEmail

User Rating: / 14
PoorBest 

AddThis Social Bookmark Button

A tutorial on honeypots.

 

Written by DC 406 Webmaster Wednesday, 13 July 2011 08:14

   

Mutually Assured Disruption?

PDFPrintEmail


AddThis Social Bookmark Button

Cyber detterrence through mutually assured disruption?

Potomoc Institute

Gen. Hayden

Video.

 

Written by DC 406 Webmaster Wednesday, 13 July 2011 07:22

   

Dropbox Reader

PDFPrintEmail

User Rating: / 54
PoorBest 

AddThis Social Bookmark Button

A nice set of python scripts that allow you to read dropbox content.

http://www.cybermarshal.com/index.php/cyber-marshal-utilities/dropbox-reader

 

Written by DC 406 Webmaster Saturday, 18 June 2011 23:27

   

Page 6 of 97

<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>