Download :
Friday, August 26, 2011
BlueTooth Hacking Tools
platform, that can be used to search out and hack Bleutooth-enabled
devices.
Bleutooth-enabled devices. It will try to extract as much information
as possible for each newly discovered device. Download BlueScan.
can browse and explore the technical specification of surrounding
Bleutooth-enabled devices. You can browse device information and all
supported profiles and service records of each device. BTBrowser works
on phones that supports JSR-82 – the Java Bleutooth specification. Download BTBrowser.
Password Hacking Methods - Part II
3) Default Passwords:- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.
Always disable or change the applications' (both online and offline) default username-password pairs.
4) Brute Force:- If all other techniques failed, then attackers use brute force password cracking
Category: Hacking
The Best Operating System for Hackers
BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking.
Category: Software
Password Hacking Methods - Part I
Password Hacking
Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :
1) Hashing:- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.
Category: Hacking
Bermain dengan Google
Have Fun With Google
Hello friends there is some trick for you.
IN INDONESIA :
Pertama buka Google.com / Google.co.id
Kedua Ketik "Google Sphere" di kolom pencarian
Keempat Gerakkan mouse mu dan lihat lah
Anda juga bisa mengetikkan "Google Gravity"
Category: Info
Best 8 Crypters Download
8 Software Crypers terbaik
CRYPTERS! Download
- GRINGOCRYPT
- COOD'S CRYPTER
- UD CRYPTER
- FLYCRYPTER
- CARBON CRYPTER
- BRM CRYPTER
- ANOTHER CRYPTER
- NUFCRULE3_CRYPTER
Category: Software