Author Archive
How long time does it take to crack a password We made a little tool which can help you with time estimations when securing your customers server environment or preparing to recover a password. The tool we have arranged for you – shows how much a little research can do for the operational time. You find
The very mention of hacking, and we are all ears to the latest buzz in this intriguing world of technological advances. While some may squabble and crib about the existing threats to the underlying security of a network acquired through hacking, it is the playground of the hackers that keeps itself abreast with the prevalent
Video about SQL Injection A picture says more than a thousand words – so we made a little video for you about SQL injection. Don’t miss the related article if you haven’t read it already. We added a simulator where you can try it out without any risks. Here’s the video: https://vimeo.comy/m/98054492 Simulator We also
Tools Some of the tools that we have referenced to from our newsletters, articles and e-books. Password hash detectors http://foofus.net/goons/fizzgig/pwdump/ http://www.oxid.it/cain.html Password crackers – Multiple operating systems / versions http://www.oxid.it/cain.html http://www.openwall.com/john/ http://hashsuite.openwall.net/download http://ophcrack.sourceforge.net/ http://www.project-rainbowcrack.com/ http://hashcat.net/oclhashcat/ http://securityxploded.com/hash-kracker-console.php
Asterisk password – saved in browser Having many and secure passwords can be thought. In this clip we show how you can display any passwords that are hidden under asterisks – and it does not even take 10 seconds. The trick is to change the input type in the form layer to a text field. This
Heartbleed bug About the heartbleed bug The secret keys can be leaked from the service or hosting provider, which allows an attacker to decrypt any encrypted traffic to the web server, such as passwords. The attacker can then use e.g. the credentials to authorize as the user. Off course all other confidential or private
Hacking groups and the most common technique they use (“SQL Injection”) Once consigned to those shadows of the computer underground, hacking has become a common practice! The news of Cyber security breaches manage to make it to the daily newsfeed of some country each day. With household names like LulzSec and Anonymous gaining more popularity
About the Techworld article This article was updated 2015-03-10. This is now confirmed by Emanuel from how-to-hack.net exclusively for TechWorld share what he found. For obvious reasons, we will not now describe exactly how the open disks found online, but we are content to say that it is relatively simple things it is about. The files
Newspapers from the world’s all corners, has during the day reported that more than 5000 different organisations has signed up for the campaign “The day we fight back”. Focus is mass surveillance The most focused topic is “Mass surveillance” which gives NSA a message to stop with their illegal activite. It’s sad that Google,
Adobe Flash Player CVE-2014-0497 Another flash exploit…. Security focus, one of the most respected sites by hackers all over the world – reports that a remote execution exploit has been detected for Adobe Flash Player. This vulnerability is affecting Windows, Mac and Linux operating systems and the potential risk this leads to made the