public marks

PUBLIC MARKS from decembre with tags security & hacking


HACK - VIDEO - Applied Hacking channel - Samy Kamkar - YouTube

SITE: Applied Hacking channel. I'm releasing original research, tools and videos around hacking, technology and security - typically around reverse engineering, coding, software, hardware, radio, electronics, fabrication and physical security (as in physical lock picking, not as in flying karate chops). Full source code, schematics, 3D models, and documentation will often be provided, and I'll go step by step into many of these projects so you can follow along, and build even better things! If I don't forget, I'll also explain how to protect yourself from such attacks and methods to improve security.


Crack a Wi-Fi Network's WEP Password with BackTrack, the Fancy Video Version - LifeHacker

Last summer we detailed how to crack a Wi-Fi network's WEP password using BackTrack. Now video blog Tinkernut revisits the subject with a great video step-by-step of the process. More »


FireCAT - Carte rassemblant les meilleures extensions firefox en terme de sécurité

FireCAT est une carte rassemblant les meilleures extensions firefox en terme de sécurité. Vous pouvez l’utiliser pour vous constituer le navigateur de vos rêves avec des extensions pour auditer la sécurité des sites web, mais aussi pour sniffer des informations ou programmer vous même vos scripts…EtcCette carte est régulièrement mise à jour. Vous la trouverez au format HTML, PDF ou Freemind

How to crack Microsoft Windows Vista / XP-workstations and Windows 200x servers in a minute? - June 2007

What’s the problem? This problematic security feature exists because Windows Vista Repair Computer / System Recovery program enables the use of command prompt without any user authentication with highest possible - system-level – priviledges. Cracking Windows operating systems has been possible by using cracking software found from various web pages. This is the first time when cracking Windows operating systems is really easy and needs no deeper technical knowledge. This is the reason, why everyone using Windows should understand the cracking method and start preparing safety systems, if needed.


Lockpicking - by Deviant Ollam

Lockpicking & Physical Security - Deviant's Presentation Slides


Hacking Web 2.0 Applications with Firefox

by 1 other
This article looks at some of the methods, tools and tricks to dissect web 2.0 applications (including Ajax) and discover security holes using Firefox and its plugins. The key learning objectives of this article are to understand the:


the Google Hacking Database (GHDB) :: I'm j0hnny. I hack stuff.

by 17 others
Welcome to the Google Hacking Database (GHDB)! We call them 'googledorks' (gOO gôl'Dôrk, noun, slang) : An inept or foolish person as revealed by Google. Whatever you call these fools, you've found the center of the Google Hacking Universe! Stop by