Hacking the Cable Modem: What Cable Companies Don't Want You to Know
English | PDF | 320 Pages | 21.645 Mb

In the beginning there was dial-up, and it was slow; then came broadband in the form of cable, which redefined how we access the internet, share information, and communicate with each other online. Hacking the Cable Modem goes inside the device that makes Internet via cable possible and, along the way, reveals secrets of many popular cable modems, including products from Motorola, RCA, WebSTAR, D-Link and more.

Inside Hacking The Cable Modem, you'll learn:
the history of cable modem hacking how a cable modem works the importance of firmware (including multiple ways to install new firmware) how to unblock network ports and unlock hidden features how to hack and modify your cable modem what uncapping is and how it makes cable modems upload and download faster

Written for people at all skill levels, the book features step-by-step tutorials with easy to follow diagrams, source code examples, hardware schematics, links to software (exclusive to this book!), and previously unreleased cable modem hacks.

* Just skip the ads, Thank you! *


Unknown Reply 10:00 PM

Hacking the Cable Modem: What Cable Companies Don't Want You to Know English | PDF | 320 Pages | 21.645 Mb In the begi...

Mike Shema, "Hacking Web Apps: Detecting and Preventing Web Application Security Problems"
English | ISBN: 159749951X | 2012 | PDF | 296 pages | 14 MB

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve.

Attacks featured in this book include:

. SQL Injection

. Cross Site Scripting

. Logic Attacks

. Server Misconfigurations

. Predictable Pages

. Web of Distrust

. Breaking Authentication Schemes

. HTML5 Security Breaches

. Attacks on Mobile Apps

Even if you don't develop web sites or write HTML, Hacking Web Apps can still help you learn how sites are attacked-as well as the best way to defend against these attacks. Plus, Hacking Web Apps gives you detailed steps to make the web browser - sometimes your last line of defense - more secure.
More and more data, from finances to photos, is moving into web applications. How much can you trust that data to be accessible from a web browser anywhere and safe at the same time?
Some of the most damaging hacks to a web site can be executed with nothing more than a web browser and a little knowledge of HTML.
Learn about the most common threats and how to stop them, including HTML Injection, XSS, Cross Site Request Forgery, SQL Injection, Breaking Authentication Schemes, Logic Attacks, Web of Distrust, Browser Hacks and many more.


Hacking Web Apps: Detecting and Preventing Web Application Security Problems

Unknown Reply 9:59 PM

Mike Shema, "Hacking Web Apps: Detecting and Preventing Web Application Security Problems" English | ISBN: 159749951X | 20...

Hands-On Ethical Hacking and Network Defense, 2nd Edition
Language: English
Publisher: Cengage Learning PTR; 1 edition (April 17, 2012)
ISBN-10: 1133935613 | ISBN-13: 978-1133935612 | PDF | 464 Pages | 83 MB
Amazon info

It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who understand how attackers compromise networks is growing right along with the threat. Government agencies and private companies rely on "ethical hackers"--professional security testers--to put their networks to the test and discover vulnerabilities before attackers do. If you have an understanding of computers and networking basics and are considering becoming a security tester, HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE will show you how to get started in this fascinating, growing field. This book covers the gamut, from the legalities of ethical hacking to the details of malware, network attacks, cryptography, OS vulnerabilities, wireless network hacking, and much more. Successful security testers know their work calls for creative, critical thinking, and they enjoy the challenge of digging deep to solve complex problems. Step up to the challenge with HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE.

* Just skip the ads, Thank you! *

Hands-On Ethical Hacking and Network Defense FREE PDF DOWNLOADS

Unknown Reply 9:58 PM

Hands-On Ethical Hacking and Network Defense, 2nd Edition Language: English Publisher: Cengage Learning PTR; 1 edition (April 17, ...

[AQW] Le bot 8.4

Unknown Reply 9:41 PM

Le bot 8.4 Download: Download Le Bot 8.4 Mirror: Download Le Bot 8.4 *Just skip the ads, ty*

How to install Backtrack with VirtualBox
tutorial I’m using Backtrack 5 R3 and VirtualBox 4.2 on Windows.
Before we get started…
  1. Download and install the latest version of VirtualBox here
  2. Download the latest version of Backtrack here
    1. If you’re running 64-bit, make sure you download the 64-bit version.
Once VirtualBox has been installed, you should see something like this:

First, you want to create a new Virtual Machine (out backtrack VM). Click on the new button to start creating your VM.
Hit the next button to continue.

Type the name of your VM, select Linux as the Operating System and Ubuntu (64 bit) as the version. If you’re running 32-bit, you’ll need to select the “Ubuntu” version that doesn’t have the 64-bit in the name. If you are running 64-bit, you can technically run both, but you’ll get moreperformance running the 64-bit version. The reason that you select Ubuntu is because currently Backtrack is not one of the options.
Hit next…
I usually change this from the default of 512 MB to 800 MB. You can really change this to whatever you want but I’ve ran into ram issue at 512MB so I tend to up it. Next

Create new Start-Up Disk. Next

I usually just use the default VDI. Next

I usually do dynamically allocated so I’m not taking up space that I don’t need to take up. This should be the default. Next
My default for this is 8 GB. I feel like this is way too much so I usually lower it to 2 GB. I have 2 TB, so if you have less memory and you’re concerned about memory you can probably do less, just keep in mind that you may run into issues once you start to do updates. If your planning on using Metasploit, which I highly recommend you do, you’ll need to update it and the updates especially can take up some space. Next
Once you’ve done all of this, you should see the new VM in the main VirtualBox admin.
Next, we want to launch the VM, to launch the VM select the newly created VM and hit the start button.
Next, because this is the first time we’re opening this VM, we have to import our BackTrack ISO. Next…
Click the Folder Icon to the right of the select box. From here, browse to the Backtrack ISO file that you downloaded. Hit Next…

This is basically a summary of what you just did. Hit Next…
Now that you’ve imported your ISO to the VM, VirtualBox should automatically load up the first BackTrack screen. If it doesn’t do it automatically and just closes, just select the VM and hit the start menu again.
Once you see this screen, just hit the enter button to continue to the next screen.
You should then get this screen, from here select the default which is “BackTrack Text” mode. Then his enter to continue. After hitting enter, Backtrack will start loading all of your hardware setting which should take less than a minute.
Once all of your hardware has been loaded and configured in backtrack, you’ll get the BackTrack Text Mode. If you’re a Terminal Wizard you can do everything you want to from here. I personally like to pull up the Graphical User Interface just because I like the look and feel of having some windows. In addition, there are some applications that require a GUI like Armitage that you just can’t use without the GUI.
To load of the GUI, type “startx” and hit enter. This should load up the GUI within about 30 seconds.
You should see something like this…
I use an external WIFI card. You may need to add it dropping down the USB devices, selecting your WIFI card. If it doesn’t come up right away, you may need to start Backtrack and add your USB wifi card before Backtrack loads up the hardware settings.
If your looking to do any type of wireless sniffing / WEP or WPA you’ll need a wireless card that supports packet injection. The cheapest wifi card that I’ve found that supports packet injection was from amazon. My card is the Medialink- 150Mbps Wireless N USB Adapter and it’s worked great for me but any wifi card that supports packet injection should work.
Medialink- 150Mbps Wireless N USB Adapter
If you want to bridge your internet from your main computer to the VM, right click on the “Two Monitor” icon in the right corner and select the “Network adapters” option.
From here make sure that the “Attached to:” field is NAT and the “Cable connected” option is checked.

src: watdafox

How to install Backtrack with Virtualbox

Unknown Reply 9:40 PM

HOW TO INSTALL BACKTRACK WITH VIRTUALBOX tutorial I’m using Backtrack 5 R3 and VirtualBox 4.2 on Windows. Before we get started… ...


Home Page:


*Just skip the ads, ty*


Unknown Reply 9:38 PM

ICO FX V2.6  CRACK! Home Page: ICO FX Download: CRACK Mirror: CRACK RUN THE PATCH, ENJOY! src:  shareman...

James Reid Self Titled Album

Unknown Reply 9:38 PM

James Reid Self Titled Album TRACKLIST: 01. Alam Niya Ba 02. You Make My Body Move 03. Gone 04. Game Changer 05. Roc...

Powered by Blogger.



If you want to share or use one of my posts on your blog site, please add credits leading to my blog website.

Simple Survey

Answer the survey, Click Me!

Askjeyci Archive

Popular Posts