Sorry for the downtime, had some noobs trying to own the site, finding that they couldn’t do shit but ddos the site. So we switched to a better server and fixed a few things. Better luck next time clowns.
Explains how you can from a SQL injection gain access to the administration console, where you can then run commands on the system. From fingerprinting to injection, to cracking the md5 passwords, to writing a phpshell, where you can easily run commands.
src: pentesterlab.com
perl script can be used to unlock apache tomcat servers
remotely by using the collected login combinations.
Tt will retrieve either a ROOT or SYSTEM reverse shell depending on the operating system. More info
This is a program illwill made in assembly that does a reverse Caller ID lookup. Just type or paste the number in the box and press ‘lookup’, if it finds any data it’ll display it on the screen above. Works with some cell phone numbers too. Download it ::HERE::
The WiFi Protected Setup (WPS) protocol is vulnerable to a brute force attack that allows an attacker to recover an access point’s WPS pin, and subsequently the WPA/WPA2 passphrase, in just a matter of hours, using the open source tool called Reaver. Think your 32 character alpha-numeric password is uncrackable? If your wireless router is using WPS then your router may be spit back your password in plain-text to the attacker in less than 10 hrs.
Went to Derbycon last week and it was awesome. The people were all great and it wasn’t a scenewhore con like Defcon. Also I got a shout-out during Mubix & carnal0wnage’s talk @ 49:07 đŸ™‚