RSS Feed twitter airdump.cz Follow RemoteSec on the Facebook
Remote Security Random Tips
News & Ads

Obsah kategorie pro 'How To'

Installing ipkg & mc (Midnight Commander & more) NAS Synology DS212j

NAS Synology pentesting Those, who are serious about generating hashs for pentesting WPA, for sure run a NAS server, in other words they have a storage with TBs of free space. NAS, made by Synology, is coming to be very user-friendly (especially after the possibility of upgrade to DSM 4.x). Unfortunately, there are still (obvious) components missing. Because we are talking about Linux serever, one of presumed possibilities are packets, an option to install software, or more precisely the opportunity to install a third party apps. But you cannot do such things with NAS, they are not even oficially supported.

The Intuitive WiFi hacking GUI app for Ubuntu Linux

Ubuntu Linux černé logo Lets look at an interesting and 100% functional graphic extension for WEP/WPA crack pack of applications, aicrack-ng (airodump-ng, aireplay-ng, aircrack-ng). The application was tested in the reality, in the operating system Ubuntu 10.04 LTS Lucid Lynx. USB WiFi card used for the test is Alfa AWUS050NH. This card was bought thanks to your donations (check out text five wireless adapters for wireless hacking). The used driver is the original part of  Ubuntu Linux (rt2800USB). Besides the pack aircrack-ng and MDK3 there are specified for the error free functioning mentioned dependances: gtk-sharp2, libncurses5-dev, monodevelop, libqyoto4.5-cil, qyoto-dev.

Utilizing multiple CPU cores for password cracking

Cowpatty cracker logoAs the market with CPU has moved to multi-core solutions as a alternative method to increase computation power, intensive computing applications are not adapting to this fact so quickly. A Lot of people still don’t know that the system is not able to split tasks into more threads and distribute the work evenly upon the cores. This task is on the application developer who has to implement the multi-thread supporting mechanism.

Evilgrade Toolkit helping with fake updates

Evilgrade iconFrom the word compound of evil and grade, you see there will be something evil about this piece of software and upgrades. It is a modular framework for supplying clients with fake updates that can contain a wide scale of payloads. The problem of poorly implemented actualization routines has been well know for quite some time now, but it seems it has been greatly overlooked. In the time of creation Evilgrade (summer 2008), very popular software has been vulnerable to this kind of exploit such as

Remote Exploit – BackTrack 4 Beta released

BackTrack 4 BetaAfter demonstrating and still tweaking the nervously expected BackTrack 4 beta at shmoocon, it is now available for download from some number of official mirrors. There are several torrents named bt4 but believe they are full of malware. The Remote-Exploit encourages you to download it directly from them. They have made a big decision on this version – moved from from Slackware to (as we have seen) an Ubuntu server with

BackTrack Linux How to Extend battery life

BackTrack 3 Can your CPU do this? The idea is, I have a notebook and I want to extend the time of working on the nootbook without being pluged into the electric outlet. There are many possibilities how to do it. It definitely means that you have installed linux based operating system. You can save something by taking away modules that are unnecessary for hardware or by reducing the backlight of LCD. And what is the second biggest time glutton right after LCD?

Hewlett-Packard BIOS hacking

Hewlett Packard logo Guide for bios hack of HP laptops in 1.0 :: What´s it about? HP as well as IBM have ona notebooks Whitelist block in bios. That means that if you change the original Wifi card with a new one the BIOS will write this: 104-Unsupported wireless network device detected. System Halted. Remove device and restart. If you contact the Hewlett-Packard customer support they will probably try to satisfy you with advices such as update bios or update driver (as it would be possible to get in any operating system :)

Bluetooth external antenna hack

bluetooth logo Modifying a Bluetooth dongle for an external antenna. BlueTooth is today a standard part of every notebook and a better mobile phone. To bad if you want to do BlueJacking or BlueSnarfing and the bluetooth is in your computer only as a fashion accessory (module glued-on the WiFi card). In that case you have only two possibilities. Take out the pigtail to connect the external antenna. It´s not much fun to make holes into the new laptop. Who has tried it found out