Blogs

  • install backtrack 3 to HD using live CD from the command line

    Posted August 5, 2011 by electro-technic

    Install Backtrack to HD Using Live CD From the command line For whatever reason, I have still been unsuccessful at installing Backtrack to a hard drive by using the installer that they provide. In addition to that, the actual steps (that work) are becoming harder and harder to find online. So I'm...

  • Intro to hashes

    Posted July 16, 2011 by st3alth

    Hello, this article will cover the topic of hashing. A hash is the product of a hashing function, and hashing functions are encryption algorithms, specifically one-way encryption. Now this means that one cannot directly decrypt it. In order to find the plain text value of a hash, you must use the sa...

  • Windows 7 and Vista Backdoor

    Posted April 8, 2011 by Phast

    If you have any experience with Windows 7 or Vista, you will know that the Administrators account is disabled by default. In XP, a simple backdoor was procured by hitting Ctrl-alt-delete twice at the login screen, to bring you to a proper login prompt, and logging into an unprotected Administrator a...

  • securing a linux workstation

    Posted March 27, 2011 by c0re

    @name: securing a linux workstation @author: c0re @year: 2011 @version: 1.0 [TOC - TableOfContent] ------------------------- 0x00 Introduction 0x01 Basics 0x02 Hardening SSH 0x03 Simple Firewall 0x04 Port Knocking 0x05 ARPalert 0x06 Final words ------------------------- ...

  • SQL injection

    Posted January 14, 2011 by Psiber_Syn

    Good afternoon Enigmagroup Users, 0x00 *I, the user waive all liability from Enigmagroup.org and its users and admins this lesson is for strict learning purposes only and if I cause damage in any way Enigmagroup.org and its members are not held responsible so do so at your own risk.* In this l...

  • My experience with my router

    Posted October 29, 2010 by SaMTHG

    Hey guys, I'm posting this because I haven't seen a new article be submitted for a while and so took it upon myself to post this and I haven't seen an article on this anywhere on the net, and I needed to do it and figured it out and then thought I may as well let people know what I discovered... Bas...

  • Keeping Your Documents Safe In a Digital Age

    Posted October 19, 2010 by BinaryShinigami

    Keeping Your Documents Safe In a Digital Age By BinaryShinigami Everyone has something they want to hide from others, whether it is porn, hacked account lists, confidential work information, or even just that secret book you have been writing in your free time that you believe will be the next ...

  • Staying Anonymous in a Heavily Monitored World

    Posted October 17, 2010 by BinaryShinigami

    Staying Anonymous in a Heavily Monitored World By BinaryShinigami The world as we know it today is vastly different than it was 10 to 15 years ago. Today no matter where we go, or what we do, we are recorded and monitored. From traffic cameras to ATM cameras, web logs, search logs, ISP logs, ...

  • Hidden User on Windows

    Posted November 13, 2009 by Phast

    Heres how to set up a hidden user if you gain access to the admin and want to get back in. This technique can be found all throughout the internet, all you have to do is google "hidden user" and you will find it. I didnt find it on this site so Im posting it here. First off, you Create an account...

  • Simple Steganography

    Posted October 28, 2009 by flames

    Let's say I have some great secret contained in a file smartly named "secret.txt". Here's what I would do: 1. First I'd take "secrets.txt" and compress it with Winrar, encrypted with a password (like "1234" or something a bit harder to guess ;-). The result may be a file aptly named "secrets.rar"...

  • Understanding Human Nature

    Posted August 8, 2009 by whoami

    Understanding Human Nature I know there is another introduction article to Social Engineering, but I wrote this awhile back for another so I thought I'd contribute. The other article is great, this is just a different view on it. Hope you enjoy. Introduction Social Engineering is the art of m...

  • Alternate Data Stream

    Posted February 27, 2009 by p2501

    First of all I have not "discovered" this feature. I read about it on some Czech server and author was a guy called .cCuMiNn.. There was also citation from Hakin9 by RubberDuck, so past your gratitude there and not to me, I just share the knowledge :-) Nevertheless I found it very interesting and I ...

  • The Bifid Cipher

    Posted October 20, 2008 by invas10n

    The Bifid Cipher ------------------- Introduction: ---------------- The Bifid cipher, developed by Felix Delastelle in 1901, is a combination of the Polybius square (please see Polybius Cipher article) with transposition. How it works: Firstly, you must be familiar with the Polybiu...

  • The Scytale Cipher

    Posted October 5, 2008 by invas10n

    Scytale Cipher -------------- Introduction ------------ Scytale was a simple transposition cipher that was used by the ancient Greeks and Spartans to communicate during their military campaigns. It was quite popular due to the easy and speed in which the message could be deciphered by th...

  • The Grille Cypher

    Posted September 25, 2008 by invas10n

    The Grille Cipher ----------------- The Grille Cipher falls into the Transposition Cipher category. A transposition cipher is a plaintext message which is manipulated in such a way as to display a secret cipher text within it. For a good example, I refer to the movie Red Dragon, part of th...