securityblog.gr
Sniffing email passwords with Wireshark | PenTesting | Hacking | Coding
http://securityblog.gr/1718/sniffing-email-passwords-with-wireshark
Sniffing email passwords with Wireshark. Posted on 22/01/2013, 13:29. Select an interface and start capturing in promiscuous mode. To capture credentials from POP apply this filter:. Poprequest.command = USER. Poprequest.command = PASS. To capture credentials from IMAP apply this filter:. To capture credentials from SMTP apply this filter:. Smtpreq.command = AUTH. Larr; Get all system processes with C#. Display Network Errors →. Active Directory enumeration from non-domain system. Hardening SSH on Debian.
securityblog.gr
Backtrack | PenTesting | Hacking | Coding
http://securityblog.gr/tag/backtrack
Two alternatives for Backtrack. Kali Linux From the creators of BackTrack comes Kali Linux, the most advanced and versatile penetration testing distribution ever created…. WEP cracking using Gerix Wifi Cracker in BackTrack. GerixWiFiCracker is GUI for Aircrack-ng suite, is designed for pentesting in a realworld with efficent and userfriendly graphic interface. Get…. WEP cracking using fern wifi cracker in BackTrack. Change mac address in BackTrack. Installing Software Center and Synaptic on Backtrack.
securityblog.gr
Detect exe dependencies | PenTesting | Hacking | Coding
http://securityblog.gr/2863/detect-executable-dependencies
Posted on 28/07/2015, 13:30. 8211; scans any 32-bit or 64-bit Windows module (exe, dll, ocx, sys, etc.) and builds a hierarchical tree diagram of all dependent modules. For each module found, it lists all the functions that are exported by that module, and which of those functions are actually being called by other modules. Larr; Parsing JSON in C. Control DNS Responses →. Active Directory enumeration from non-domain system. Nessus qdb open: invalid table of contents. Hardening SSH on Debian.
securityblog.gr
Parsing JSON in C | PenTesting | Hacking | Coding
http://securityblog.gr/2858/parsing-json-in-c
Parsing JSON in C. Posted on 24/07/2015, 18:25. Is a minimalistic JSON. Parser in C. It can be easily integrated into the resource-limited projects or embedded systems. Library sources are available at bitbucket.org/zserge/jsmn. Highly portable (tested on x86/amd64, ARM, AVR). No dependencies (even libc! No dynamic memory allocation. Extremely small code footprint – it’s just about 200 LOC. API has only 2 functions. Library code is covered with tests. Detect executable dependencies →.
securityblog.gr
Address | PenTesting | Hacking | Coding
http://securityblog.gr/tag/address
How to get the local IP address(es) using C in Windows. GetIpAddrTable function You have to add the following libraries into your project: ws2 32.lib and iphlpapi.lib. Check this post on how…. WebRTC Vulnerability leaks Real IP Address. WebRTC Vulnerability leaks Real IP Address of VPN User. This security flaw can reveal your real IP address, even if…. Get public/external IP address in C#. Physical Address Extension (PAE). Resolve hostname to ip address in C. Resolve hostname to ip address in C. Install ...
securityblog.gr
Disclaimer | PenTesting | Hacking | Coding
http://securityblog.gr/disclaimer
This site is related to IT, Hacking, Programming and Computer Network Software Security. The word Hack or Hacking that is used on this site shall be regarded as Ethical Hack or Ethical Hacking respectively. This is not a site that provides any illegal information. We do not promote hacking, software cracking and/or piracy. All the information provided on this site are for educational purposes only. The site or the authors are not responsible for any misuse of the information. Hardening SSH on Debian.
securityblog.gr
IT | Security | Hacking | Programming - Part 2
http://securityblog.gr/page/2
Black box WordPress vulnerability scanner. WPScan is a black box WordPress vulnerability scanner. WPSCAN ARGUMENTS –update Update the database to the latest version. –url …. Bruteforce attacks against common database servers. HexorBase is a database application designed for administering and auditing multiple database servers simultaneously from a centralized location, it is…. Grabbing Passwords from Memory. PowerShell for offensive security. Common nmap commands during Pentest. Kali Linux provides multi...
securityblog.gr
Compress buffer with zlib in C | PenTesting | Hacking | Coding
http://securityblog.gr/2847/how-to-compress-a-buffer-with-zlib-in-c
How to compress a buffer with zlib in C. Posted on 17/07/2015, 12:33. To build the following code, you first have to link zlib library, zlibstat.lib. File, with your project and define ZLIB WINAPI. In your project’s properties - c/c - preprocessor definitions. Define GZIP ENCODING 16. Z stream stream ;. Z DEFAULT COMPRESSION ,. Z DEFLATED ,. GZIP ENCODING ,. Z DEFAULT STRATEGY ). HEAP ZERO MEMORY ,. Stream. next in. Z const Bytef *. Stream. avail in. Stream. next out. Stream. avail out. Z FINISH ). Enter...