H4x0r5 Playground
Follow
Find
46.9K views | +17 today
H4x0r5 Playground
Reading is knowledge, knowledge is power, power is to use it wisely.
Curated by 0xerror
Your new post is loading...
Your new post is loading...
Scooped by 0xerror
Scoop.it!

Webapplication Attack : Injection flaws Attack with Video Demonstration ~ WILD HACKERS

Webapplication Attack : Injection flaws Attack with Video Demonstration ~ WILD HACKERS | H4x0r5 Playground | Scoop.it
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

Pwning With Backtrack 0x05 - Hacktalk.net

Thanks once again to Grap3_Ap3 for this awesome tutorial on dnsTracer




You are not allowed to view links.
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

Artillery 0.3 Alpha Released! « Dave (ReL1K) Kennedy's Security Haven « SecManiac.com

more...
No comment yet.
Scooped by 0xerror
Scoop.it!

DNS Service Oriented DoS / DDoS Attacks ≈ Packet Storm

Information Security News, Files, Tools, Exploits, Advisories and Whitepapers...
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

Intrusion Detection Tools for Linux | InfoSecBuzz

This article talks about some important Intrution Detection Linux tools like Snort, NIKTO, Metasploit framework, SPIKE, Ollydbg debugger and Nessus.
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

Carnal0wnage & Attack Research Blog: Direct Shellcode Execution via MS Office Macros with Metasploit

scriptjunkie recently had a post on Direct shellcode execution in MS Office macros I didnt see it go into the metasploit trunk, but its there. How to generate macro code is in the post but i'll repost it here so i dont have to go looking for it elsewhere later. He even has a sample to start with so you can see how it works. Just enable the Developer tab, then hit up the Visual Basic button to change code around.

more...
No comment yet.
Scooped by 0xerror
Scoop.it!

Fully Undetectable Backdoor generator for Metasploit | The Hacker News (THN)

Fully Undetectable Backdoor generator for Metasploit | The Hacker News (THN) | H4x0r5 Playground | Scoop.it
Fully Undetectable Backdoor generator for Metasploit.
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

Complete Cross Site Scripting(XSS) Guide : Web Application Pen Testing ~ ETHICAL HACKING TIPS

Complete Cross Site Scripting(XSS) Guide : Web Application Pen Testing ~ ETHICAL HACKING TIPS | H4x0r5 Playground | Scoop.it
RT @xsploitedsec: Complete Cross Site Scripting(XSS) Guide: http://t.co/h0Ed3pHx #webapps #pentest...
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

Passware Kit 11.3 Tool to crack Apple FileVault Encryption | SecTechno

Passware Kit 11.3 Tool to crack Apple FileVault Encryption | SecTechno | H4x0r5 Playground | Scoop.it
After introducing the first tool to crack Microsoft bitlocker encryption Passware company have created a new version that help user to have a full access to Mac...
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

How to Find DNS using Backtrack 5

How to Find DNS using Backtrack 5 | H4x0r5 Playground | Scoop.it
DNSenum DNSenum is a pentesting cool created to enumerate DNS info about domains First Open Your backtrack and Follow these...
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

iPod Touch and iPhone Mobile Pentesting

iPod Touch and iPhone Mobile Pentesting | H4x0r5 Playground | Scoop.it
How to turn an iPod Touch or iPhone into a mobile hacking device. Metasploit, Social-Engineer Toolkit, aircrack, dsniff, namp, tcpdump...
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

Brute Forcing LUKS

Well, as you might have noticed (and some of you knew) I haven't been updating auditme or my blog or well much of anything else. Quite simply this was because I locked away most of my data (includi...
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

 InfoSec Institute – IT Training and Information Security Resources – Timing Analysis Attacks in Anonymous Systems

 InfoSec Institute – IT Training and Information Security Resources – Timing Analysis Attacks in Anonymous Systems | H4x0r5 Playground | Scoop.it

Anonymous systems are used to allow users to surf the web and communicate with servers anonymously.

Some of the popular anonymity service providers are TOR, GTunnel, etc. The main reason for using and anonymous system is most often to hide the identity of the user.

However it is important that the efficiency of the anonymous system is not decreased in the process of providing this service and which depends on numerous factors like latency, the degree of anonymity, etc.

The communication between the sender and the receiver happens through a set of routers, often referred to as a mix or node, whose job is to hide the relationship between the incoming and outgoing packets. It does this by using various techniques i.e., using encryption, adding delays, adding cover traffic, etc.

more...
No comment yet.
Scooped by 0xerror
Scoop.it!

Backtrack 5 - Upgrade #355: ttheHarvester 2.1 Blackhat Edition - Redmine

Redmine (Upgrade #355 (New): ttheHarvester 2.1 Blackhat Edition: theHarvester is a tool to gather emails, subdomains, hos...)...
more...
No comment yet.
Scooped by 0xerror
Scoop.it!

HP Communities - SWFScan - FREE Flash decompiler - Enterprise Business Community

Because I get about 5 requests per week for it, here it is.  Enjoy.
 
THIS is the one, the only, HP's fantastic SWFScan Adobe Flash de-compile tool and basic 'security scanner' ...
more...
No comment yet.