FBI Fears Chinese Hackers and/or Government Agents Have Back Door Into US Government & Military Computer Networks

April 21, 2008 0 Comments 0 tags

ome months ago, my contacts in the defense industry had alerted me to a startling development that has escalated to the point of near-panick in nearly all corners of Government

Hacking a Windows 2000 system through IPC$

April 21, 2008 0 Comments 0 tags

1: Scanning for open Win2k systems2: Connecting to the IPC$3: Connecting and using Computer Management.4. Disable NTLM5: Starting the Telnet service6: Creating user accounts and adding them to a group7:

Project: The Wifi Predator

April 13, 2008 0 Comments 0 tags

Picture this: You find yourself sitting in a hotel room that does not offer wireless internet… As you look out the window, you spot that the three hotels & a

CRLF Injection

April 2, 2008 0 Comments 0 tags

CRLF Injection Overview CRLF Injection is typically used in HTTP Response Splitting. In the HTTP specification there is a spec stating that the HTTP header is to be split from

LDAP Injection Vulnerabilities

March 22, 2008 0 Comments 0 tags

LDAP Injection Overview LDAP Injection attacks are not as common as the other types of injection attacks, but if your product uses an LDAP server this must be tested. An

Basic MS-DOS commands

March 20, 2008 0 Comments 0 tags

ADDUSERS – Add or list users to/from a CSV file ARP Address – Resolution Protocol ASSOC – Change file extension associations ASSOCIAT – One step file association AT – Schedule

Winsock tutorial

March 14, 2008 0 Comments 0 tags

Just a little something I have been writing on and off. It was originally meant to be a collaboration of two of my prior tutorials, however, I’m starting to find