Blogs

  • How the myspace SWF hack worked

    Posted August 19, 2008 by Ausome1

    How the myspace SWF hack worked First note: I DID NOT MAKE THE HACK. I simply downloaded the .swf's, decompiled them, looked at the actionscript, worked out what it did, found the Javascript that it uses, and tidied it up & commented it. I've probably got some bits wrong, feel free to contact me ...

  • Google Hacking

    Posted August 19, 2008 by Ausome1

    inurl:index.of.password Directory listing contains password file(s)? intitle:"Index of" service.pwd Directory listing contains service.pwd file(s) intitle:"Index of" view-source Directory listing contains view-source file(s) intitle:"Index of" admin Direcory listing contains administrat...

  • What is a Denial of Service (DoS) attack?

    Posted August 19, 2008 by Ausome1

    What is a Denial of Service (DoS) attack? Well, its the most common form of security attack, the easiest to perform and the hardest to track down and stop. A DoS (Denial of Service) attack by design sends a large enough amount of traffic to a host, group of hosts or network in order to overwhelm ...

  • Setting up a reverse SSH tunnel

    Posted August 19, 2008 by Ausome1

    Takeaway: Learn to forward a port on a remote machine to a local machine while initiating the SSH tunnel from the local machine. SSH is an extremely useful tool in that it allows you to do many things in a secure fashion that you might not otherwise be able to do. One of the things SSH allows yo...

  • IRC Command Help - Channel And User Modes

    Posted August 19, 2008 by Ausome1

    -- Channel And User Modes -- Channels can have additional constraints, which can be set by the MODE command. To understand this, recall that the first person that joined a channel effectively creates it and is, at least initially, in charge of the channel. He or she becomes a Channel Operator or ...

  • IRC Command Help - Some Less Basic Commands

    Posted August 19, 2008 by Ausome1

    -- Some Less Basic Commands. -- /MSG {nickname|channel} {text} Sends a (private) message to specified nickname or channel. Besides chatting on IRC Channels you can also have private conversations or queries with other people on IRC. On most clients these conversations will be handled by separate...

  • IRC Command Help - Basic Commands

    Posted August 19, 2008 by Ausome1

    -- Basic Commands -- With most windows IRC clients an extensive help file is included. Dont hesitate to try the /help command. IMPORTANT NOTE : ALL IRC COMMANDS START WITH A "/". The forward slash is the default command character. Commands on IRC are not case sensitive, and can be abbreviat...

  • Hiding Files

    Posted August 19, 2008 by Ausome1

    Hiding files, directories, or even to the names of the files themselves. A useful CLSID is the Control Panel one: {21EC2020-3AEA-1069-A2DD-08002B30309D}. Example 1: - Create a text file test.txt - Rename it: Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D} Its icon changes and looks li...

  • Full Path Disclosure

    Posted August 19, 2008 by haZed

    [+]-----------------------------------------------------------------------[+] Disclosure [+]-----------------------------------------------------------------------[+] ------------------------------------------------------------------------------ What is Full Path Disclosure? -----------...

  • Regular expression examples

    Posted August 18, 2008 by Ausome1

    Addresses //Address: State code (US) '/\b(?:A[KLRZ]|C[AOT]|D[CE]|FL|GA|HI|I[ADLN]|K[SY]|LA|M[ADEINOST]|N[CDEHJMVY]|O[HKR]|PA|RI|S[CD]|T[NX]|UT|V[AT]|W[AIVY])\b/' //Address: ZIP code (US) 'b[0-9]{5}(?:-[0-9]{4})?b' Columns //Columns: Match a regex starting at a specific column on a line...

  • Atm Reprogramming

    Posted August 15, 2008 by RedEvolution

    Well, this is an article on how to "hack" and ATM. This still works, as masses of people are unaware of its existence. (X)Briefing (X)Cards (X)Machines (X)Changes (X)Hitting It (X)Reverse (X)Stores (X)Parking (X)Briefing Starting off, there is a common misconception of what really take...

  • Common Internet Vulnerabilities 2

    Posted May 21, 2008 by CrashOverron

    Common Internet Exploits/Vulnerabilites 2 written by Crash Overron .:::.Contesnts.:::. 0. Introduction 1. Full Path Disclosure 2. RCE 3. Log Posioning 4. SQL Injection 5. EXIF 6. Conclusion [b]0. Introduction[/b] Hello once again from Crash Overron, hopefully this article will be bette...

  • How to crack WEP

    Posted May 20, 2008 by Evo

    Clientless WEP Cracking by: Evo Before Starting, Ensure: Your hardware supports packet injection. You can verify this by using Wireshark. You are within range of an ap. Just because you can see packets transmitted from the ap, doesn't mean you can send them to the ap if the distance is too...

  • An A-Z Index of the Linux BASH command line

    Posted December 1, -1 by Ausome1

    An A-Z Index of the Linux BASH command line alias (Create an alias) awk (Find and Replace text, database sort/validate/index) break (Exit from a loop) builtin (Run a shell builtin) cal (Display a calendar) case (Conditionally perform a command) cat (Display the...