Max Headroom’s List of Acronyms – pt 1 (1990’s)

max-headroom

A lot of you are probably feeling the same I way am right at the moment I am writing this file. I just got done applying for a nice board and I simply went blank while filling out the New … Continue reading

Hackers – Wizards of the Electronic Age (1984)

Hackers – Wizards of the Electronic Age is a PBS documentary directed by Fabrice Florin filmed at the first Hacker Conference that took place at the Headlands Institute Conference Center in 1984. The conference was organized as a result of … Continue reading

Historical Hacking Philes: ATM Security Overview (1987)

ATM

(>View: automatic teller machines From ames!amdahl!nsc!voder!wlbr!gins Mon Jul 13 12:41:23 PDT 1987 Article 479 of sci.crypt: Path: ames!amdahl!nsc!voder!wlbr!gins >From: gins@wlbr.UUCP (Fred Ginsburg) Newsgroups: sci.crypt Subject: Re: ATM secret codes Summary: ATM stuff LONG… Message-ID: <1038@wlbr.UUCP> Organization: Eaton IMS, Westlake Village, … Continue reading

How To Hack: Exploit SNMP for Reconnaissance

Hugh-Jackman-Swordfish

The more we know about a system or network, the better our chances of owning it and not leaving a trace for investigators to follow. One of the often overlooked sources for information is the Simple Network Management Protocol (SNMP). … Continue reading

Kali Linux on Android Using Linux Deploy

kali-android-deploy

Kali Linux on any Android Phone or Tablet Getting Kali Linux to run on ARM hardware has been a major goal since day one. So far, there have been native images built for the Samsung Chromebook, Odroid U2, Raspberry Pi, … Continue reading

Historical Hacking Philes: A Beginners Guide to Hacking Unix by Jester Sluggo (1985)

A-BEGINNERS-GUIDE-TO-Hacking-Unix-740x230

************************************** * A beginners guide to: * * H A C K I N G * * * * U N I X * * * * By Jester Sluggo * * Written 10/08/85 * ************************************** In the following file, … Continue reading

How To Hack: Change the Signature of Payloads to Evade Antivirus

crypting

I’ve written several listener guides on creating a malicious PDF or malicious Word document that would carry in it a payload with the Meterpreter, or reverse shell enabling you to own the system. One of the hurdles to using these … Continue reading

Historical Hacking Philes: My Favourite UNIX Commands, By ZeeBee (1990)

Unix-1

*** My Favourite UNIX Commands *** *** A List Of Some OF The Most Useful UNIX ** *** Hacking Commands, and Some Hints On Their Usage *** *** Written By ZeeBee Australia Inc. 1990 *** Ok UNIX freaks, here is … Continue reading

Wireless Security: Everything you ever needed to know about Wifi Hacking

71zv9N8F-qL._SL500_AA300_

The following is a very thorough and concise overview of Wifi Security. I think it will be very important for my fellow Security Hacker / Pen Testers to have this knowledge stored away somewhere in the back of their head. … Continue reading

Hacking Tricks: LANs.py – Packet Parsing/Injecting ARP Poisoner

One_Byte_at_a_Time

LANs.py: (Download at Github) Individually poisons the ARP tables of the target box, the router and the DNS server if necessary. Does not poison anyone else on the network. Displays all most the interesting bits of their traffic and can … Continue reading

Book: Hacking, 2nd Edition by No Starch Press

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really … Continue reading

Hacking Wifi: Cracking WEP with Kali Linux

wifi-hacking

Today, we commonly find wireless networks around us. Most wireless networks are encrypted using WEP or WPA encryption methods. I was recently looking around my site and realized that I had not ever posted a how-to on easily cracking WEP. … Continue reading

How to Hack: Ultimate Metasploit Meterpreter Command Cheat Sheet

metasploit

Many of you have probably heard about the MetaSploit Meterpreter Shell. A number of you have probably even used it. But some of you are probably wondering, “What are all the commands for Meterpreter?” Well, here we have a comprehensive … Continue reading

Robert Tappan Morris – Creator of the First Internet Worm

images

Robert Tappan Morris (born November 8, 1965) is an American computer scientist and entrepreneur. He is best known for creating the Morris Worm in 1988, considered the first computer worm on the Internet, and for companies he has founded. Morris … Continue reading

MafiaBoy Brings Down Yahoo, eBay, Amazon, and others…

article-2477746-1902D66800000578-687_634x434

MafiaBoy was the Internet alias of Michael Demon Calce, a high school student from West Island, Quebec, who launched a series of highly publicized denial-of-service attacks in February 2000 against large commercial websites including Yahoo!, Fifa.com, Amazon.com, Dell, Inc., E*TRADE, … Continue reading

Documentary: Cybercops (2000)

Cybercops is a Channel 4 UK documentary first aired on December 21st 2000. The documentary explores threats to electronic commerce at the turn of the century and the work done by various private companies and law enforcement agencies to defend … Continue reading

How to Hack: Use Wireshark to Capture, Filter, and Inspect Packets

wireshark-logo

Wireshark, a network analysis tool formerly known as Ethereal, captures packets in real time and display them in human-readable format. Wireshark includes filters, color-coding and other features that let you dig deep into network traffic and inspect individual packets. This … Continue reading

Documentary: The Day of the Technopath (1989)

The October 11th, 1989 Dispatches episode – The Day of the Technopath – explores computer security threats of the era. This documentary is particularly interesting because very common problems today are discussed at their infancy: organized crime first experimenting with … Continue reading

How To Hack: Execute BAT File in the Background Invisibly

Batch coading

What happens when you double-click on a BAT file? Or, you run the BAT file from your commandeered cmd prompt? It pops up and runs! Now, we can’t be having the user see this, can we? A hacker also sometimes … Continue reading

How To Hack: Using dnsdict6 to Enumerate DNS Records (IP, NS, MX, Subdomains, etc)

hqdefault

INTRODUCTION If you want to gather information about a target’s DNS, you should probably use a tool like dnsdict6 to help you to enumerate many of the details which are not easily apparent for your average user or websurfer. With dnsdict6 you … Continue reading