Backtrack 5 on Google Nexus

I love playing around with my android phone. The fact that it’s linux based makes it flexible and hackabel. In this tutorial, we are going to look at how to run the linux distro Backtrack on Googles Galaxy Nexus phone. For this you need a rooted device along with a … Continue reading

Share Button

Aircrack vs. Hashcat

There are two types of bruteforce attacks – raw bruteforce and dictionary attacks. A raw bruteforce attack means trying every single password within the specified limits, and a dictionary attack means only trying passwords from a dictionary file. With more and more powerful hardware in household computers, it’s becoming possible … Continue reading

Share Button

Packet Crafting with Scapy

I found this great tool called Scapy, which enables the users to capture, build and send packets onto the network exactly as they want them. This opens for a world of possibilities and because Scapy is based on Python it’s fairly easy to script advanced network functions. I’m using Backtrack … Continue reading

Share Button

Bruteforce attack on RDP, SSH & FTP using Ncrack

Ncrack is a network authentication cracking tool. It is used to do bruteforce attacks on different protocols and is fairly straight forward to use. First of all let’s check which services is running on the target computer. We do this by doing an nmap scan – in this scenario the … Continue reading

Share Button

Find cleartext passwords in memory dump

The Random Access Memory (RAM) is where system components, applications and other data is kept, while the computer is working with it. It is placed there often in clear text for fast access, but there is a security risk involved in this, which is often ignored. In this tutorial, we’ll … Continue reading

Share Button

Sniffing Packets with Snort

Snort is a packet sniffer which uses the WinPcap library for sniffing network traffic. What makes Snort stand out is its ability to be configured to detect and log many different traffic patterns. This tutorial will be based on the Windows version of Snort, since it’s the basics, but for … Continue reading

Share Button

Scrambeld Alphabet

I had a course called Security and Forensic Computing with Professor Bill Buchanan of Napier University. One of the first topics was the use of different cipher methods. The most basic cipher is the Caesar cipher – which is said to have been used by Julius Caesar to encrypt his … Continue reading

Share Button

Virgin Media and the WPS flaw

Some cleaver guys figured out that there is a flaw in Wi-Fi Protected Setup (WPS). WPS was developed for an easy way to connect devices to a wireless network, by using an eight-digit pin code. WPS is enabled on many routers as default, no matter if they are running WEP, … Continue reading

Share Button