Metasploit: The Penetration Tester’s Guide | No Starch Press

The Penetration Tester’s Guide by David Kennedy, Jim O’Gorman, Devon Kearns, and Mati Aharoni July 2011, 328 pp. ISBN: 978-1-59327-288-3 “The best guide to the Metasploit Framework.” —HD Moore, Founder of the Metasploit Project The Metasploit Framework makes discovering, exploiting, … Continue reading

Xerox PARC (Palo Alto Research Center)

Xerox PARC

PARC (Palo Alto Research Center Incorporated), formerly Xerox PARC, is a research and development company in Palo Alto, California, with a distinguished reputation for its contributions to information technology and hardware systems. Founded in 1970 as a division of Xerox … Continue reading

Some Interesting Google Dorks

Google Dorks

Evidence has been found of certain documents around the web holding passwords and other vital information that many probably don’t want revealed. Here is a list of interesting Google Dorks that uncover some of these documents. This is for purposes … Continue reading

BMW e46 Factory Car Alarm Install and BMW Scanner 1.4 Coding for BMW 330, 328, 325, 323, 320, 318, 316

BMW e46 Alarm Install

Complete walkthrough of installing the Factory Car Alarm for my BMW 330xi. My particular car came without the OEM Car Alarm installed, so I bought the three pieces off eBay for $130 and installed them myself. This installation should go … Continue reading

Most Sophisticated Mobile Trojan Ever Found – Android Malware Anatomy Revealed

Android-Virus

Security firm Kaspersky has reported what they claim to be the most sophisticated Trojan ever found targeting a mobile platform. Google has already been informed of the details and a new fix can be swiftly expected. Nicknamed the “Backdoor.AndroidOS.Obad.a” – … Continue reading

[How To] Bypass Win7 Password, Decrypt Win7 Password HASH, & Lift Firefox Passwords

So, this took a while for me to put together, but it worked out good. Refer below for further resource. I will am tryin to get my hands on the v2.2 so I can post another Tut for Win8. Otherwise, … Continue reading

Alarming NSA Project: PRISM – Complete Defeat of Privacy

NSA taps into user data of Apple, Google, Facebook, Microsoft, AOL, and others, secret files revealed. Companies deny any knowledge of program in operation since 2007. The NSA access is part of a previously undisclosed program called PRISM, which allows … Continue reading

(How To) Kali Linux: Intercept Secure Passwords from HTTPS SSL with Ettercap and sslstrip

Here I will be showing how to setup ettercap settings on Kali Linux, then we will proceed to do a man in the middle attack on a wireless network. I will be using ettercap and sslstrip to do this. The … Continue reading

(How to) Kali Linux: Hack Encrypted Wifi Passwords with Reaver and Airmon-ng WPA – WPA2 – WPS

Hack Wifi Passwords and Encryption

Here we will go through how I tested Kali Linux with Reaver and Airmon-ng to hack into my WPA2 encrypted work network. In order to use Reaver, you need to get your wireless card’s interface name, the BSSID of the … Continue reading

[How To] Enable Sprint Wifi Hotspot on Samsung Galaxy S4

Prerequisite: ROOT YOUR PHONE. Okay folks, I guess I had to take matters into my own hands. There was no video on what to do for Sprint. I read the XDA site and made some logical conclusions with the file … Continue reading