Pages

Tuesday, April 19, 2011

How to Crack Windows Administrator Passwords

Some times it necessary to know admin passwords in schools ,collages to log in with admin privileges to do various things There are many way to crack passwords. But in this tutorial I will explain a very basic method using a single tool to crack windows password . This might come handy in places like schools ,collages where you cant use your live Linux cds , usb ..etc because your being watched Things we need : 1. Pwdump or Fgdump to extract password hashes In this tutorial I will be using Pwdump Extracting Password hashes :- 1. Open My...

Network Security

Network security audit, also known as network security assessment, refers to the process of determining the security shortcomings on your network. The process is critical for a business because sensitive or critical information on a network cannot be adequately protected if you do not know what type of vulnerabilities or security holes exist on the network. Security auditing and assessing of your network is not a one-time event. Security assessments should be ongoing because networks are constantly changing as new devices are added, configurations...

Wednesday, April 13, 2011

Call-Center-Software Multiple Security Issues

PUBLISHED AT http://www.mayhemiclabs.com/advisories/MHL-2006-002.txt http://www.mayhemiclabs.com/wiki/wikka.php?wakka=MHL2006002 PUBLISHED BY Mayhemic Labs http://www.mayhemiclabs.com security AT mayhemiclabs DOT com GPG key: 0x56143F84 APPLICATION call-center software http://www.call-center-software.org/ "call-center-software is a free open-source application released under the GPL" AFFECTED VERSIONS Versions 0.93 and below ISSUES Call-Center-Software is vulnerable to multiple SQL injection attacks and XSS under certain conditons, along...

The underbelly of cyberspace

Computer security expert Ray Weadock admits even he can't stop every hacker. They once seized his personal Internet account and sent obscene e-mail in his name to the White House. Another hacker trashed computer files at the Tampa school attended by Weadock's son, doing $120,000 in damage. Cyberspace is like the new frontier, says Weadock, who heads the Tampa network security company Fortress Technologies. "There are few sheriffs out there." With the global boom in the Internet and ever-cheaper personal computers, hacking is spreading like...

The History of Hacking

Early 1960s <<...>>  University facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers. At first, "hacker" was a positive term that was used to describe a person with a mastery of computers who could push programs beyond what they were designed to do. 1983 <<...>> In one of the first arrests of hackers, the FBI busts six teen-age hackers from Milwaukee, known as the "414s" after the local area code. The hackers are accused of some 60 computer break-ins,...

Related Posts Plugin for WordPress, Blogger...