
My personal blog dedicated to delving in PC and electronics security, programming and exploring.
Showing posts with label PC. Show all posts
Showing posts with label PC. Show all posts
Wednesday, April 6, 2016
Sunday, February 1, 2015
Sticky keys privilege escalation on windows xp
An article about the sticky keys privilege escalation exploit that contains explanation on how it works, several tips and a tutorial. The purpose of a privilege escalation attack is to gain more privileges over a operating system. An example can be gaining administrator privileges from a restricted account on windows xp system which is what we are going to do today.
Labels:
cmd,
Hacking,
linux,
PC,
privilege escalation,
security,
windows xp
Sunday, November 30, 2014
Cracking FTP with hydra

Monday, August 25, 2014
Cracking truecrypt containers with truecrack
Truecrack is a software designed to crack truecrypt containers using brute force attack or wordlist attack. It can be useful if you have created a truecrypt container and forgotten the password. The cracking speed depends on the computers CPU.
For more info and a tutorial click the following link.
Tuesday, August 19, 2014
Cracking archives with rarcrack
For more info and a tutorial click the following link.
Shredding a file in Linux with shred
When deleting a file by simply pressing the delete button there is the possibility that the file can be recovered. That's where shred comes in, What shred does is to wipe the file and make it unrecoverable. This can be very useful if you want to delete a file with sensitive data.
For more info and a tutorial click the following link.
Monday, August 18, 2014
Crunch wordlist generator
Crunch is a known and very capable wordlist generator. It works by using a predefined charset or a user defined one to generate all possible combinations and write them to file line by line. Wordlists are used in password attacks.
For more info and a tutorial click the following link.
MDCrack how to crack hashes (MD4/MD5/NTLM1)

Subscribe to:
Posts (Atom)