Hacking SOHO Routers

May 18, 2008 0 Comments 0 tags

The purpose of this paper is to outline the security measures being taken by vendors to prevent such attacks in their home routing products, what those security measures accomplish, and

Understanding /etc/passwd and /etc/shadow

May 13, 2008 0 Comments 0 tags

Q. Can you explain /etc/passwd file format for Linux and UNIX operating systems? A. /etc/passwd file stores essential information, which is required during login i.e. user account information. /etc/passwd is

How to prevent SQL Injection

April 28, 2008 0 Comments 0 tags

SQL Injection: What It Is There was once a famous doctor that had it completely right: never trust your patients. Now this doctor may have only been a sitcom doctor

TCP/IP Tutorial

April 25, 2008 0 Comments 0 tags

This tutorial is intended to supply a brief overview of TCP/IP protocol. Explanations of IP addresses, classes, netmasks, subnetting, and routing are provided, and several example networks are considered. The

FBI Fears Chinese Hackers and/or Government Agents Have Back Door Into US Government & Military Computer Networks

April 21, 2008 0 Comments 0 tags

ome months ago, my contacts in the defense industry had alerted me to a startling development that has escalated to the point of near-panick in nearly all corners of Government

Hacking a Windows 2000 system through IPC$

April 21, 2008 0 Comments 0 tags

1: Scanning for open Win2k systems2: Connecting to the IPC$3: Connecting and using Computer Management.4. Disable NTLM5: Starting the Telnet service6: Creating user accounts and adding them to a group7:

Project: The Wifi Predator

April 13, 2008 0 Comments 0 tags

Picture this: You find yourself sitting in a hotel room that does not offer wireless internet… As you look out the window, you spot that the three hotels & a