Posted electro-technic
byInstall Backtrack to HD Using Live CD From the command line For whatever reason, I have still been unsuccessful at installing Backtrack to a hard drive by using the installer that they provide. In addition to that, the actual steps (that work) are becoming harder and harder to find online. So I'm...
Posted Deleted Member
byHello, this article will cover the topic of hashing. A hash is the product of a hashing function, and hashing functions are encryption algorithms, specifically one-way encryption. Now this means that one cannot directly decrypt it. In order to find the plain text value of a hash, you must use the sa...
Posted Deleted Member
byIf you have any experience with Windows 7 or Vista, you will know that the Administrators account is disabled by default. In XP, a simple backdoor was procured by hitting Ctrl-alt-delete twice at the login screen, to bring you to a proper login prompt, and logging into an unprotected Administrator a...
Posted Deleted Member
by@name: securing a linux workstation @author: c0re @year: 2011 @version: 1.0 [TOC - TableOfContent] ------------------------- 0x00 Introduction 0x01 Basics 0x02 Hardening SSH 0x03 Simple Firewall 0x04 Port Knocking 0x05 ARPalert 0x06 Final words ------------------------- ...
Posted Psiber_Syn
byGood afternoon Enigmagroup Users, 0x00 *I, the user waive all liability from Enigmagroup.org and its users and admins this lesson is for strict learning purposes only and if I cause damage in any way Enigmagroup.org and its members are not held responsible so do so at your own risk.* In this l...
Posted SaMTHG
byHey guys, I'm posting this because I haven't seen a new article be submitted for a while and so took it upon myself to post this and I haven't seen an article on this anywhere on the net, and I needed to do it and figured it out and then thought I may as well let people know what I discovered... Bas...
Posted BinaryShinigami
byKeeping Your Documents Safe In a Digital Age By BinaryShinigami Everyone has something they want to hide from others, whether it is porn, hacked account lists, confidential work information, or even just that secret book you have been writing in your free time that you believe will be the next ...
Posted BinaryShinigami
byStaying Anonymous in a Heavily Monitored World By BinaryShinigami The world as we know it today is vastly different than it was 10 to 15 years ago. Today no matter where we go, or what we do, we are recorded and monitored. From traffic cameras to ATM cameras, web logs, search logs, ISP logs, ...
Posted Deleted Member
byHeres how to set up a hidden user if you gain access to the admin and want to get back in. This technique can be found all throughout the internet, all you have to do is google "hidden user" and you will find it. I didnt find it on this site so Im posting it here. First off, you Create an account...
Posted Deleted Member
byLet's say I have some great secret contained in a file smartly named "secret.txt". Here's what I would do: 1. First I'd take "secrets.txt" and compress it with Winrar, encrypted with a password (like "1234" or something a bit harder to guess ;-). The result may be a file aptly named "secrets.rar"...
Posted Deleted Member
byUnderstanding Human Nature I know there is another introduction article to Social Engineering, but I wrote this awhile back for another so I thought I'd contribute. The other article is great, this is just a different view on it. Hope you enjoy. Introduction Social Engineering is the art of m...
Posted p2501
byFirst of all I have not "discovered" this feature. I read about it on some Czech server and author was a guy called .cCuMiNn.. There was also citation from Hakin9 by RubberDuck, so past your gratitude there and not to me, I just share the knowledge :-) Nevertheless I found it very interesting and I ...
Posted invas10n
byThe Bifid Cipher ------------------- Introduction: ---------------- The Bifid cipher, developed by Felix Delastelle in 1901, is a combination of the Polybius square (please see Polybius Cipher article) with transposition. How it works: Firstly, you must be familiar with the Polybiu...
Posted invas10n
byScytale Cipher -------------- Introduction ------------ Scytale was a simple transposition cipher that was used by the ancient Greeks and Spartans to communicate during their military campaigns. It was quite popular due to the easy and speed in which the message could be deciphered by th...
Posted invas10n
byThe Grille Cipher ----------------- The Grille Cipher falls into the Transposition Cipher category. A transposition cipher is a plaintext message which is manipulated in such a way as to display a secret cipher text within it. For a good example, I refer to the movie Red Dragon, part of th...