Methods of Making Your Trojans/Bots F/Undetecable

November 13, 2009 0 Comments 0 tags

1. Crypters/Binders. This is By far the most Common Way to Make Your Trojan Undetectable. Almost everyone Who Makes There Trojans Undetectable Uses a Public Crypter, My First Public Crypter,

Cracking WPA FAST with video cards!

November 13, 2009 0 Comments 0 tags

By now, pretty much everyone has heard that it is easy to hack into WEP protected networks. As we have seen in our Cracking WEP article, it is terribly easy.

Hacking Your Computer – Physical Access is Total Access

November 12, 2009 0 Comments 0 tags

Hacking Your Computer – Physical Access is Total Access Table of Contents -Disclaimer -Introduction Part 1: Gaining Access -LiveCDs -Windows Option 1: Cracking the Password -Windows Option 2: Circumventing the

Torrent Poisoning

October 27, 2009 0 Comments 0 tags

=== Introduction === The BitTorrent protocol identifies peers using a tracker. Each peer announces itself to the tracker via HTTP. Certain parameters in the announce request itself can be altered

Facebook “CSRF” attack-Full Disclosure

October 22, 2009 0 Comments 0 tags

How a Facebook App works Anyone can create an application (or app) that will run within the Facebook platform (and many do!). An app is like a regular website with

Study on the undetectable Server Bifrost 1.2d for the AV

September 5, 2009 0 Comments 0 tags

1. Objective Trying to make the Bifrost Server 1.2d which is the latest version of a remote control KSV undetectable to Antivirus Software Required —– description ———————————————————————— Download Bifrost 1.2dR.AT

Tutorials (overflow, using debugers, exploits coding…)

August 13, 2009 0 Comments 0 tags

* Stack based overflows (direct RET overwrite) : (Tutorial Part 1) http://www.corelan.be:8800/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/ * Jumping to shellcode : (Tutorial Part 2) http://www.corelan.be:8800/index.php/2009/07/23/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2/ * Stack based overflows – SEH (Tutorial Part 3)