math270.blogspot.com
Math/Sec 270: November 2008
http://math270.blogspot.com/2008_11_01_archive.html
For students of Math/Sec 270 at John Jay College. Sunday, November 30, 2008. Sorry for the late post. Here is the code we were playing around with in class:. Posted by Jamie Levy. A Sixty-Eight Year Old Code. Since we were talking about cyphers and such, I thought you might like this blogpost about WWII German espionage code. Posted by Jamie Levy. Monday, November 24, 2008. I thought you guys might like this blogpost. Posted by Jamie Levy. Monday, November 17, 2008. An Overview of Cryptography. Unfortuna...
theunl33t.blogspot.com
The Unl33t: How to Generate Rainbow Tables for Cowpatty using genpmk to crack WPA/WPA2
http://theunl33t.blogspot.com/2011/06/how-to-generate-rainbow-tables-for.html
Saturday, June 18, 2011. How to Generate Rainbow Tables for Cowpatty using genpmk to crack WPA/WPA2. Over the past few days I've had people ask me how to generate rainbow tables for Cowpatty. It's quite simple. Just a few things you should know first:. Each table is for ONE ESSID. In WPA/WPA2, the SSID of the network is used as a salt to the encryption. You will want to find a good password dictionary file. I recommend the Renderlab. S password list found here. D Output hash file. The whole process isn't...
blog.kismetwireless.net
Kismet Wireless: September 2013
http://blog.kismetwireless.net/2013_09_01_archive.html
Wednesday, September 25, 2013. Drive-by Wi-Fi Attacks Against Android The Beginning of Defense. Drive-by command execution in short. Just posted information about a significant vulnerability in Android applications using common ad networks. To summarize,. The Android WebView API implements a miniature browser inside an app - not only does it render HTML, it can execute javascript. There's plenty of interesting function calls to run, but the one leveraged by MWR Labs is to get the runtime environment of t...
adsbforgeneralaviation.com
Who’s Who - ADS-B for General Aviation
http://adsbforgeneralaviation.com/whos-who
ADS-B for General Aviation. Next Generation safety in the sky. Though my short list will grow over time, these are some folks to watch today. If you know of other shakers and movers in this area, send me their names and some information about them that others should know. This is all about establishing our community of experts and influencers, and building momentum toward substantial ADS-B deployment in the not too distant future. FAA, Air Traffic Organization, Director,. Capezzuto is a graduate of Georg...
infowarcon.com
IWC 2014 | InfowarCon 2016
http://infowarcon.com/iwc-2014
Thanks to everyone who made this year’s revival of InfowarCon a success! Below are some of the amazing talks given in January. We highly suggest you listen to them all; lots of great information, questions, and demonstrations about the most important issues facing us today. See you next year! Espionage and Data Extrication from High Security Environments. Building WMDs at Costco for the Poor Man’s Terrorist. IWC Chair Emeritus, Mercyhurst). VTC: IO / IW Education: Two Decades of Successes and Failures.
theunl33t.blogspot.com
The Unl33t: June 2011
http://theunl33t.blogspot.com/2011_06_01_archive.html
Wednesday, June 22, 2011. Metasploit module to reset admin password on 2wire wireless routers. This module is now a part of metasploit. just run msfupdate and it should be under auxiliary/admin/2wire/xslt password reset. For details, see. On my ubuntu box I placed this under /opt/metasploit3/msf3/modules/auxiliary/admin/2wire/2wirepasswordreset.rb. Class Metasploit3 Msf: Auxiliary. Include Msf: Exploit: Remote: HttpClient. Name' = '2Wire Password Reset',. Version' = '$Revision: 1 $',. Method' = 'POST',.
msfbt.wordpress.com
Links | Msf
https://msfbt.wordpress.com/links
Certified Wireless Network Professionals. Social Engineering Official Site. The New Exploit DB (formerly Milw0rm). Hackers on Planet Earth. Phone Losers of America. The Church of WiFi. Christopher Hadnagy (Social Engineer Website). HD Moore (Metasploit and Rapid 7). Hernan Ochoa (WiFiZoo / Pass the Hash). TOOOL (Lock Picking 101). Pureh@te from the BackTrack Linux Forums. Skomentuj Anuluj pisanie odpowiedzi. Wprowadź swój komentarz do tego pola. Adres nie będzie widoczny). Perl – OnLine Library. Sorry, y...
blog.kismetwireless.net
Kismet Wireless: A guest post from Renderman
http://blog.kismetwireless.net/2013/09/a-guest-post-from-renderman.html
Thursday, September 12, 2013. A guest post from Renderman. This decision is of a court that does not seem to understand the technology nor that trying to make new technologies fit in the definitions of old tech is not going to fit. Under this judgement, the entire 802.11 specification is technically in violation. With Google and their famous motto of 'Don't Be Evil', every judge looking to make a name is hoping to be the one to make them 'be evil'. You can see more from Renderman at @ihackedwhat.