Monthly Archive for: ‘February, 2012’

  • Lab Setup

    If you are serious about pen testing you need somewhere to practice your skills. Many course now provided a lab that you can pay to have access to for a certains period of course this is great but you can always build your own lab. …

    Read More →
  • Sed & Cut

    This is a short video on how to use sed and cut to clean up a database file and get the username and password hashes from it.

    Read More →
  • Cracking WEP Video

    This is a short video on how to crack WEP using the aircrack-ng suit of tools.

    Read More →
  • Linux Basic Video

    Sometime ago I started to record my own videos, that I hope will help others into security. This is the first video I have ever done and I hope you all enjoy it and I look forward to posting many more.

    Read More →
  • Privilege Escalation

    dankalia– Hacking Linux Part I: Privilege Escalation pretentiousname– Windows 7 UAC whitelist

    Read More →
  • File Include (Local & Remote)

    digininja – When All You Can Do Is Read labs.neohapsis – Tricks of the Trade inswomniasec – LFI with phpinfo Assistance websec – Exploiting PHP File Inclusion Overview

    Read More →
  • Tunnelling & Pivoting

    pauldotcom– SSH gymnastics with proxychains digininja– Nessus Through SOCKS Through Meterpreter coresec– Reverse Shell Techniques for Linux pauldotcom– Python One Line Shellcode gnucitizen– Reverse Shell with Bash bernardodamele– Reverse shells one-liners secmaniac– Creating a 13 line backdoor worry free of A/V hdesser– Get a meterpreter …

    Read More →
  • Teensy Fake USB device

    Ok so I purchased two teensy devices off the internet to have a look at. If you don’t know what this is then its worth looking into but a short description would be a USB that plugs into a computer and runs code. The device …

    Read More →