Archive for the ‘Uncategorized’ Category

Sometimes carrying around a laptop to conduct wireless recon can be a pain.
Today I will show how with your rooted Android & a couple free programs from the Android marketplace you can begin doing some real wireless recon.


To start search for and install the following 5 programs.
1) Droidwall
2) WiFi Analyzer
3) Shark for Root
4) Shark Reader
5) Network Discovery

Some other useful tools: ssh client, file manager w/SMB, RDP client, Wireless Tether,
Android Webserver, FTP client & server


Once all programs are installed we setup our Droidwall like so
Droidwall Rule1Droidwall Rule2
Continue doing this for Network Discovery and other programs
you wish to use during your recon fun.


We launch our WiFi Analyzer
WiFi Analyzer Screen
Using the signal strength meter we find a good access point to visit.
Then we launch our Shark to eat up the packets out there.
Eventually we will end up with some data to read.
We can use Shark Reader now or a desktop later to read the data.
Shark Reader 1Shark Reader 2
We can also use our Network Discovery tool to find devices
and services running on the target network.
Network Discovery

Some more advanced techniques using some of the additional tools mentioned above could be to launch phishing attacks in areas requiring users to login thru a web based portal.

When looking for cool spots to capture some traffic try your networks, coffee shops, airports, campuses, hotels, etc…


Pimpin’ is Pimpin’

Posted: 2009/06/11 in Uncategorized

I must apologize for the lack of updates.
Between work and other projects my hacking research has suffered.
BUT! Rest assured the security pimp is still pimpin’
I’m just doing it in another fashion at the moment.
My first home studio album will be released next month..
Hopefully still with enough time to give my hacking skills a week or 2 to prep up for Blackhat & Defcon this year ..

Find out more about my musical project Here

With all the disease scare going on lately.
Just a reminder to clean out those Doritos chip lined keyboards every once in a while.

Keyboards Are Disgusting

Keyboards Are Disgusting

Curtis & Kenneth Wiltshire were arrested & charged with identity theft using stolden data.

A former employee at the Federal Reserve Bank of New York and his brother were arrested Friday on suspicion of obtaining loans using stolen identities.

Having seen some pretty shabby excuses for IT analysts thru the years somehow I suspect this may just be the tip of the iceberg ..

Read More Here …

On this day in history in 1943 Albert Hoffman unknowingly became the first human guinea pig to a lysergic acid compond he was conducting tests on. When he accidentally ingested it thus becoming the first person to hallucinate on lysergic acid diethylamide (LSD).

What was interesting is this was first used to treat schizophrenia?
Somehow I would figure this would have an opposite effect but then again what would I know about it ..

Watch This Day in History Clip …

Never before has a presidential candidate used technology in the way the Obama administration did during the past elections. From Youtube, to twitter tweets sent from him trusty Blackberry. Obama definitely leveraged his technilogical savvy in his favor. So then why after more than a handful of months into his term has he still not chosen a CTO for the nation? Is it due to lack of competent technology folks? Maybe he feels it is not as important as say visiting the Tonight show? Or maybe he wants to assume the responsibilities himself on the weekends and in his spare time? Techcrunch is running a poll on this very question. So take the time and head on over and share your input on this question. In a world of increasing threats to our IT infrastructure you would figure this role should be filled soon…

Read More Here …

“Successful exploits may allow attackers to violate the same-origin policy, obtain sensitive information, bypass security restrictions, run untrusted applets with elevated privileges, and cause denial-of-service conditions. This may result in a compromise of affected computers.”

Find out More Here

During our trek through Google Maps we found a chicken carcass the size of a large SUV, a car covered in Post-It notes, and what looks like a UFO parked in a back yard. We’ve collected a few of the oddest and most intriguing sights.

Read More Here

After a hard fought Monday in the data center trenches it is sometimes too easy to forget how simple our problems can be. When compared to a true disaster of not just IT infrastructure but basic human needs infrastructure. I remember reading about some of the staff responsible for trying to keep business moving during one of the worst US disasters in recent times. Some call it “Katrina” while the ones who lived thru it still call it hell.

“We’re on the 10th and 11th floor of a corporate high rise on Poydras Ave., right near St. Charles. We have generators and tons of food and water. It is five of us total. I am not sure how the Internet connection will be affected. I have a camera and my gun. Sustained winds are 175, gusts to 215. The real danger is not the wind, it’s the storm surge the wind will be pushing into the city from the Gulf through the lake. The city might never recover. Honestly, this thing could be biblical”

Read More Here

Worried about how you will let others know you made it to heaven after you die?
Well worry no more the website has got you covered.
Should the rapture or other event claim your life this Christian based site will not only contact your friends and family via email to let them know your safe with God, but they will also forward up to 120MB of data to your contacts.

They even have a Rapture DR plan that will trigger the event from various geographical locations when the judgement day comes. I mean I will be checking my email that day won’t you?

Now to answer the question does sending everyone a message saying “eat $hit and DIE!” considered a Sin if its done after your already dead and in heaven? Sounds like a fun experiment to me!