Showing posts with label PC. Show all posts
Showing posts with label PC. Show all posts

Wednesday, April 6, 2016

Creating a disk image with dd


Intro  

       The dd command is a useful utility that allows someone to easily image a storage unit. You can use this command to backup your flash drive, sdcard, etc. It can also be useful for forensic work, e.g if you're trying to recover deleted files from a flash drive, you can image the drive then work on the image keeping the original safe.




Sunday, February 1, 2015

Sticky keys privilege escalation on windows xp

 An article about the sticky keys privilege escalation exploit that contains explanation on how it works, several tips and a tutorial. The purpose of a privilege escalation attack is to gain more privileges over a operating system. An example can be gaining administrator privileges from a restricted account on windows xp system which is what we are going to do today.

Sunday, November 30, 2014

Cracking FTP with hydra

           Hydra is a fast login cracker that supports a lot of protocols. It is a command line tool, but a GUI is available. The FTP (File Transfer protocol) is used to remotely access files either on a home server or a web server hosted on a web hosting provider. The cracking speed is low but with a weak password and a good wordlist it is possible to be cracked. Most attackers will try to crack a password only if there is no other way in(e.g using an exploit or social engineering).


Monday, August 25, 2014

Cracking truecrypt containers with truecrack


             Truecrack is a software designed to crack truecrypt containers using brute force attack or wordlist attack. It can be useful if you have created a truecrypt container and forgotten the password. The cracking speed depends on the computers CPU.

For more info and a tutorial click the following link.

Tuesday, August 19, 2014

Cracking archives with rarcrack


           Rarcrack is a handy encrypted archive cracker. It can be very useful if you forget a password to encrypted archive. It supports zip, 7z and rar. But on the downside it is slow, the speed depends on the computers processor.
For more info and a tutorial click the following link.

Shredding a file in Linux with shred


         When deleting a file by simply pressing the delete button there is the possibility that the file can be recovered. That's where shred comes in, What shred does is to wipe the file and make it unrecoverable. This can be very useful if you want to delete a file with sensitive data.
For more info and a tutorial click the following link.

Monday, August 18, 2014

Crunch wordlist generator


        Crunch is a known and very capable wordlist generator. It works by using a predefined charset or a user defined one to generate all possible combinations and write them to file line by line. Wordlists are used in password attacks.
For more info and a tutorial click the following link.

MDCrack how to crack hashes (MD4/MD5/NTLM1)

       MDCrack is a powerful and fast hash cracker. It can brute force MD5, MD4 and NTLM1 hashes. MDCrack is terminal tool but there is a GUI available. It is available for Windows and for Linux. For a quick tutorial , download links and more info click the following link.