Search:
Type: Posts; User: xicepik; Keyword(s):
Search:
Search took 0.01 seconds.
-
February 8th, 2004, 03:40 PM
And remember that they did this for the phising problem, not even because it's clear text in URL password username... But it's still in a RFC, and if it's in a RFC, it's for a good cause. The problem...
-
February 6th, 2004, 05:53 AM
I'm a web programmer. And guess what.. This thing hit us in the face this week. This URL login feature was not meant to secure a web site with military security, it was just a little "more" security...
-
January 17th, 2004, 12:50 AM
Well, here is what I know about the linksys router (note that I'm not a pro in security) :
First, if someone scan you from the Internet, they will "scan" your router. It will never reach your...
-
January 9th, 2004, 10:23 AM
No funny processes are running on his computer? (I guess he already look for that but who knows)
You can also look for BHO Cop, a great program that I use for checking those nasty BHO.
Oh, and...
-
January 9th, 2004, 01:29 AM
You also want to read about SQL injections :
http://www.nextgenss.com/papers/advanced_sql_injection.pdf
http://www.spidynamics.com/papers/SQLInjectionWhitePaper.pdf
Have fun
-
January 6th, 2004, 03:51 AM
Is it because you don't want people to copy your stuff with copy/paste?
-
January 5th, 2004, 06:38 PM
I like the "realistic missions" at http://www.hackthissite.org . You need to "hack" a website using SQL injection. This is way more "realistic" than cracking a javascript password box. Nobody is...
-
January 5th, 2004, 06:15 AM
Ok.. by kazzalite k++ or something like that. Thanks! :)
-
January 5th, 2004, 05:44 AM
Oh, and gator.com was in comment, so I guess that buy installing Divx (it's installing gator too), the little nasty Gator proggy put the line in comment! Ha, nasty nasty Gator! :P
-
January 5th, 2004, 05:42 AM
Thanks, that's why I was not able to go to teenxxx.com (joking..)
I didn't looked at all the file, I should have, sorry :|
some of the comments are :
# Kazaa related:
# Websites involded in...
-
January 5th, 2004, 05:21 AM
I looked at my HOSTS file and there is A LOT of 127.0.0.1 with a website url after that..
example :
127.0.0.1 desktop.kazaa.com
127.0.0.1 www.altnetp2p.com
127.0.0.1 alpha.kazaa.com
127.0.0.1...
-
January 5th, 2004, 02:48 AM
scriptkiddie18 :
For level 0, you need to login as :
login : level0
pass: guest
Then, you need to find an "exploit" to get the access of the level1 group. When you get that, just execute the...
-
January 4th, 2004, 07:41 AM
I don't really know Kevin Mitnick or anything about his story except some little things.. So why are you all (almost) saying that he is this and that?
-
January 4th, 2004, 12:20 AM
I read somewhere that Mitnick can't post his hacking stories untill 2010. I don't if it's true tough. :|
-
January 3rd, 2004, 05:17 AM
If a hacker uses more than one proxies, let say 10, in different countries (different laws!) and continent, (let say : USA -> VietName -> Pakistan -> France -> Brazil etc..), there is a lot of...
-
January 2nd, 2004, 10:00 PM
How do you know she got netbus? And how do you know the guy is using xp?
Anyway, hacking back is stupid.. Just find his IP and the time he was logged on the Net and report him to his ISP. If you do...
-
December 31st, 2003, 09:09 PM
Trying to hack another server on the net if you don't have the permission is not really intelligent. It's illegal. Especially if it's a server with a lot of websites and services on it and you use...
-
December 31st, 2003, 05:34 PM
Thanks ! I'll try to make some report and post them in the newbie section, even if my english is not that good. :D
-
December 31st, 2003, 03:01 PM
Thank you ! :)
Well, I think I'll buy 4 Athlon 2ghz (I got a good price for those), so It willl be "compatible" with Windows and easily with linux (There's no problems with Athlon and Linux?) ,...
-
December 30th, 2003, 11:48 PM
I got some little questions about your text. (pretty interesting imo, good job ;) )
I want to make a little network for war games with friends and for testing IDS etc. etc.
If I want to make a...
-
December 30th, 2003, 06:35 PM
I just want to know if I understand some things right.
1st : A packet sniffer can be used on an "entire" ethernet network because all the computers receives all packets (if they are on the same...
-
December 30th, 2003, 07:19 AM
http://project.honeynet.org/ is a good start.
Search for Honeypot and Honeynet on goole and on this forum, you'll fin usefull information.
-
December 30th, 2003, 05:17 AM
You got 12 posts.. I guess you need more than that for a new "status". :|
-
December 30th, 2003, 05:13 AM
Well I know that nmap uses some things like TTL of packets and other stuff like that for os finger prints, but how to change that in Linux, I don't know. You can check in nmap docs and google what it...
-
December 30th, 2003, 03:08 AM
Try with another OS like knoppix (a boot CD, nothing to install). If it freeze, the problem is from the hardware. If not, it's Windows. not 100% accurate but a good start imo. :)
|
|