A MarketPlace of Ideas

Hacking

Computing

Hacktivity 2012 Vivek Ramachandran Cracking WPA/WPA2 Personal and Enterprise for Fun and Profit

http://www.securitytube.net/ Had APless hacking. Might be useful for security logging of nearby phones.

By Fudgy McFarlen, 5 yearsAugust 17, 2020 ago
Computing

Google Hacking Database

Google Hacking Database

By Fudgy McFarlen, 5 yearsNovember 19, 2019 ago
Computing

Rooting ATT Modem

ATT DSL modems leave much to be desired in terms of pass through for operation with devices. Research Links SharknAT&To Exploring the AT&T U-verse 5268AC DSL Modem – Part 1 Google: rooting nvg599 Rooting The NVG510 from the WebUI  – have one of these from St Louis NVG510 Fixer — An Read more…

By Fudgy McFarlen, 6 yearsMay 26, 2019 ago
Hacking

Black and Decker Combination Lock Hacking

I get junk given to me when I go to purchase things from a Craigslist sale. One such thing is a Black and Decker combination padlock.  Except I can not use it until I figure out the combination. The site below has a cracking tool: Crack any Master Combination Lock Read more…

By Fudgy McFarlen, 7 years ago
Computing

The Refund Scam

By Fudgy McFarlen, 7 years ago
Computing

Wiretapping the Secret Service can be easy and fun | Bryan Seely | TEDxKirkland

By Fudgy McFarlen, 7 years ago
Computing

DefCon 22: Hack All The Things: 20 Devices in 45 Minutes

This video demonstrates getting root access with UART port on many different types of devices that are running embedded Linux.

By Fudgy McFarlen, 7 years ago
Hacking

Chip and PIN Fraud Explained

We rely on Chip & PIN machines to pay for things in a safe way, so how are they being compromised? Ross Anderson is Professor of Security Engineering at the Computer Laboratory, University of Cambridge. Research Links YouTube:ComputerPhile Slim Shim

By Fudgy McFarlen, 7 yearsMarch 15, 2018 ago
Computing

Major Data Breaches

You hear on a regular basis about data breaches in the news.  This entry is my ongoing compilation of what I see on the internet. Research Links Wikipedia: List of Data Breaches

By Fudgy McFarlen, 8 yearsSeptember 20, 2017 ago
Computing

Search in over 10 Billion decrypted MD5 and SHA1 hashes

MD5 & SHA1 Hash Generator The MD5 hash of drowssap is: B497DD1A701A33026F7211533620780D Going the other direct with a hash is much more difficult.  It is a brute force approach to find this by trial and error. HashToolKit When you take the above hash and plug it into this website you get Read more…

By Fudgy McFarlen, 8 yearsSeptember 14, 2017 ago

Posts pagination

1 2 … 9 Next
Categories
DashBoard
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
  • About
  • Book List
  • Daily Reads
  • Design Tools
  • Informatics
  • Library
  • Math-Science
  • Side Wikis
  • References
  • BookMarks
Hestia | Developed by ThemeIsle