Computing
Hacktivity 2012 Vivek Ramachandran Cracking WPA/WPA2 Personal and Enterprise for Fun and Profit
http://www.securitytube.net/ Had APless hacking. Might be useful for security logging of nearby phones.
http://www.securitytube.net/ Had APless hacking. Might be useful for security logging of nearby phones.
ATT DSL modems leave much to be desired in terms of pass through for operation with devices. Research Links SharknAT&To Exploring the AT&T U-verse 5268AC DSL Modem – Part 1 Google: rooting nvg599 Rooting The NVG510 from the WebUI – have one of these from St Louis NVG510 Fixer — An Read more…
I get junk given to me when I go to purchase things from a Craigslist sale. One such thing is a Black and Decker combination padlock. Except I can not use it until I figure out the combination. The site below has a cracking tool: Crack any Master Combination Lock Read more…
This video demonstrates getting root access with UART port on many different types of devices that are running embedded Linux.
We rely on Chip & PIN machines to pay for things in a safe way, so how are they being compromised? Ross Anderson is Professor of Security Engineering at the Computer Laboratory, University of Cambridge. Research Links YouTube:ComputerPhile Slim Shim
You hear on a regular basis about data breaches in the news. This entry is my ongoing compilation of what I see on the internet. Research Links Wikipedia: List of Data Breaches
MD5 & SHA1 Hash Generator The MD5 hash of drowssap is: B497DD1A701A33026F7211533620780D Going the other direct with a hash is much more difficult. It is a brute force approach to find this by trial and error. HashToolKit When you take the above hash and plug it into this website you get Read more…