Category: How To’s
-
Making BitCoin with Bots
In this article we will cover how to quickly setup a trading bot for crypto-currencies. As the difficulty for BTC continues to rise the profit in mining coins continues to drop. A good method to make up those losses is with a trading bot which will work to increase your profit margin by making the…
-
From $40k to Free – The Carberp source leak
Very interesting source code leak today for the Carberp malware family. This black market malware once being offered for $40k will surely be of interest to anyone who conducts malware & botnet analysis. The leak included a few other tools that helped make it so successful like the bootloader, MC obfuscate, along with various functions…
-
How to UN-n00B: Nitko
Sometimes it really fun to watch people stumble about. Watching the drunk bloke leave the local pub after way to many. Seeing as he stumbles about in his drunken dance trying to stay on his feet. Just before he hits the curb loses his footing and tumbles on his back into the middle of the…
-
Android Wireless Recon Fun
Sometimes carrying around a laptop to conduct wireless recon can be a pain. Today I will show how with your rooted Android & a couple free programs from the Android marketplace you can begin doing some real wireless recon. Install: To start search for and install the following 5 programs. 1) Droidwall 2) WiFi Analyzer…
-
Keeping my Droid “G”
Freshly back from a new round of security based conferences I will take a moment to point out one of the more interesting topics for me this time around. The discussion on Cell Phone Spying (not that I made it inside the actual talk with the ungodly line). More specifically how by using a frequency…
-
Pen Testing with RUBY
It was in 2006 that the language known as RUBY was fully accepted as a standard language. The self described “open source programming language with a focus on simplicity and productivity” is one of the more powerful languages in use today. The folks over at Matasano Security (not affiliated with “matz” Y.Matsumoto the creator of…
-
Hack-A-Day: S-Video on your Atari 2600
Those cool guys at Hack-A-Day have a fun article on how to hack your old atari system to make it S-Video compatible thus making it actually usable without that old TV slider switch. I think this will be a good reference to perform a similar hack on my ancient Tandy PC that I really want…
-
Article: How to evaluate and manage UTM for network security
Unified threat management (UTM) is a promising approach to consolidating security controls, including firewalls, intrusion prevention, anti-virus, content filtering, and reporting. Read More Here
-
Tuning your hacking skills in a ‘Hacker Space’
A newer trend in the field of “Hacking” is the use of “Hacker Spaces”. Picture a community lab with various hardware/software for you to refine your skills in a controlled and safe environment. While this may not be a way to gain true real-world experience. It does help nuture your skill from a casual or…
-
iPhone Jailbreak 5 Step
Step 1: download 2.1 Firmware from the internet (iphonefirmware.com) Step 2: download quickpwn GUI app and install (quickpwn.com) Step 3: backup your iphone (if you haven’t already) Step 4: launch quickpwn, point to the oem firmware you downloaded in step 1 and off it goes Step 5: follow onscreen instructions (combination’s of holding power button…