Thursday, 30 September 2010

Hacker5 – India’s First Hacking Magazine

Newsmakers Broadcasting & Communication Pvt. Ltd is coming up with a niche magazine based on the cyber happenings which is the need of today in the IT industry which is touted as the first Hackers magazine of India, & I along with a lot of good people out there like Parul Khanna , Rahul Tyagi...

Thursday, 30 September 2010 by Lucky · 0

Wednesday, 29 September 2010

A Demolishing analysis of Ankit Fadia's Ethical Hacking Seminar - Overrated, Overhyped & Pure waste of Time

And there we go, I came to know about the renowned Ankit Fadia coming to my humble college & I was wondering if he will be different from those other security organizations who teach computer security & ethical hacking. He was worse. No offense to Mr Fadia, but actually I was quite saddened...

Wednesday, 29 September 2010 by Lucky · 2

Monday, 27 September 2010

Free Recharge Any Mobile Hack – Applicable on All networks :)

Yep..I perfectly know why you are here..You wish to recharge your phone for free, probably just for funs sake or just cuz you are dying to talk with your girlfriend but don't have balance for it..or you are just here to do it for educational purposes, which is a pretty lame excuse but I can digest...

Monday, 27 September 2010 by Lucky · 0

Tuesday, 21 September 2010

Devil May Cry 5 Trailer Impressions

WTF ? DMC5 ? at TGS 2010 ? released on 15 september, I got hold on the DMC 5 traileror you can say DmC trailer.For those who dont know what Devil May Cry is, go to the corner & wear the dunce cap ! Devil May Cry is the hack & slash action game series by Capcom featuring one of the most intricate...

Tuesday, 21 September 2010 by Lucky · 0

Tuesday, 14 September 2010

Marshald Punk pwns Quicktime & Windows – 9 Years Old Flaw

Great…just came to know from “El Reg” how an obsolete parameter in a program separate from OS can wreak havoc. Worse, when it was a development flaw which has been in the lurch,undetected for last 9 years. A spanish security  researcher,Ruben Santamarta recently unearthed a backdoor in Apple Quicktime...

Tuesday, 14 September 2010 by Lucky · 0

Monday, 13 September 2010

Packet-O-Matic – An Open Source Realtime Packet Processor

Packet-o-matic is a modular real time packet processor under the GPL license. It reads the packet from an input module, match the packet using rules and connection tracking information and then send it to a target module. The modular nature of packet-o-matic allows it to work for any protocol as long as its corresponding module...

Monday, 13 September 2010 by Lucky · 0

Saturday, 11 September 2010

ObiWaN – Server Bruteforcer by Phenoelit

ObiWaN is the brainchild of Phenoelit, a german hacker group headed by elite hacker FX which is written to carry out brute force security testing on Webservers. The goal of ObiWaN is a brute force authentication attack against Webserver with authentication requests - and in fact to break in insecure...

Saturday, 11 September 2010 by Lucky · 0

Wednesday, 8 September 2010

5 more sites for Security Basics

last time I blogged about 5 sites for Budding Hackers & followed up with  5 more sites for budding hackers... but as the user queries flood my inbox for more, I decided to dig a bit more & publish some of the more prominent sites I visit in my free time. The following blogs are prominient & hot favorites for security...

Wednesday, 8 September 2010 by Lucky · 0

Password recovery & hostname changes in linux

So..it recently happened to me when I while messing with my system, i wrote a script to change root password & set it to expire in every 7 days & simultaneously making changes to hostname by setting it to a random value.. I queried my friend Raghu for inputs regarding it & got some interesting results,which I will be...

by Lucky · 0

Tuesday, 7 September 2010

Buffer Overflow Attack tutorial by example

A Buffer Overflow is a flaw by which a program reacts abnormally when the memory buffers are overloaded, hence writing over adjacent memory. It can be triggered by using inputs that may alter the way a program operates,for example <inputting a very large value in a c program which does integer based addition>. A buffer overflow...

Tuesday, 7 September 2010 by Lucky · 0

Sunday, 5 September 2010

SImple Malware Scanner (Offline & Online)

Earlier I wrote about how to scan a file using multiple antiviruses online, however, alternatively you can check the md5 hash of the file & compare it to the valid one in an offline database..or can validate it at an online one like VirusTotal. The specified action is done by a program known...

Sunday, 5 September 2010 by Lucky · 0

Friday, 3 September 2010

Long time no see

Hi folks..Sorry for quite a late update..1.6 months is quite some time to be quiet (pardon for the pun). I was fiddling with reverse engineering tools, working with Secugenius, meeting old friends & more..and I guess the vacation is over..I have moved on to Linux (Fedora 13, Goddard) & I am enjoying every bit of it..I have...

Friday, 3 September 2010 by Lucky · 0

All Rights Reserved by Pro Hack . Copyright 2008 - 20011. Template by Bloggermint .