Skip to main content

Posts

Showing posts from April, 2020

HOW TO BOOST UP BROWSING SPEED?

Internet speed is the most cared factor when you buy an internet connection. What if still, you face a slow speed browsing problem? No worries, as I came with a solution to this problem. I will let you know how to boost up browsing speed. It's very simple to follow. SO, HOW TO BOOST UP BROWSING SPEED? There can be many ways you can get a speedy browsing whether you use paid service or free hacks. I am going to share this free speed hack with you. STEPS TO FOLLOW Navigate to  Control Panel > Network and Internet Options   > Network and Sharing Center . Now look for the active internet connection to which you're currently connected to. Open up  Connection Properties  of your active connection. Click on  IPv4  and open its  Properties . Here you will notice your DNS, you just need to change your DNS address with the following DNS. Preferred DNS server: 208.67.222.222 Alternate DNS server: 208.67.220.220 Once done, save it and no configure it for  IPv6.  Just change the IPv6

RFCrack Release - A Software Defined Radio Attack Tool

RFCrack uses the following hardware with RFCat libraries: YardStick One:  https://goo.gl/wd88sr I decided to cleanup my RF testing harness and release it as a tool named RFCrack Mostly because it has been pain to set up use-case scenarios from scratch for every device I am testing. Rather then release a tool no one knows how to use. The below video will be a quick but comprehensive tutorial to get you started If you've been following the blogs, this will greatly simplify your testing, in the following ways: RFCrack handles all of your data conversions.  It allows you to capture, replay and save payloads for use anytime  It will handle rolling code bypass attacks on your devices.  You can jam frequencies and fuzz specific values  It will also allow you to scan specific frequencies in discovery mode or incrementally probe them  RFCrack will hopefully have keyless entry & engine bypass support in the near future This is the first release, everything works as intended but there wil

NcN 2015 CTF - theAnswer Writeup

1. Overview Is an elf32 static and stripped binary, but the good news is that it was compiled with gcc and it will not have shitty runtimes and libs to fingerprint, just the libc ... and libprhrhead This binary is writed by Ricardo J Rodrigez When it's executed, it seems that is computing the flag: But this process never ends .... let's see what strace say: There is a thread deadlock, maybe the start point can be looking in IDA the xrefs of 0x403a85 Maybe we can think about an encrypted flag that is not decrypting because of the lock. This can be solved in two ways: static: understanding the cryptosystem and programming our own decryptor dynamic: fixing the the binary and running it (hard: antidebug, futex, rands ...) At first sight I thought that dynamic approach were quicker, but it turned more complex than the static approach. 2. Static approach Crawling the xrefs to the futex, it is possible to locate the main: With libc/libpthread function fingerprinting or a bit of manual

15 Important Run Commands Every Windows User Should Know

There are several ways to efficiently access the files, folders, and programs in Windows operating system. We can create shortcuts, pin programs to the taskbar, Start menu shortcuts etc. but we can't do it for all programs in many cases. However, the  Windows Run Command box  is one of the most efficient ways of accessing system programs, folders, and settings. In this article, I am going to share 15 most important Run commands for Windows users. These commands can make it easier to manage a lot of tasks. How to open Windows Run command box? You need to press Win+R (Hold Windows button then Press R) Important Run Commands Every Windows User Should Know 1. %temp% This is the fastest way to clear the temporary files from your computer. It can save a lot of space which was being wasted by temporary files. 2. cmd  This command will open the windows DOS command prompt. Windows command prompt is very useful for performing many tasks which are not possible using graphical user interface.

RainbowCrack

"RainbowCrack is a general purpose implementation of Philippe Oechslin 's faster time-memory trade-off technique . In short, the RainbowCrack tool is a hash cracker. A traditional brute force cracker try all possible plaintexts one by one in cracking time. It is time consuming to break complex password in this way. The idea of time-memory trade-off is to do all cracking time computation in advance and store the result in files so called "rainbow table". It does take a long time to precompute the tables. But once the one time precomputation is finished, a time-memory trade-off cracker can be hundreds of times faster than a brute force cracker, with the help of precomputed tables." read more... Website: http://www.antsight.com/zsl/rainbowcrack Related posts Chema Alonso Libros Un Hacker Grey Hat Hacking Python Desde 0 Hasta Hacking - Máster En Hacking Con Python Programas Para Hackear Fake Hacking

10 Best Wifi Hacking Android Apps To Hack Others Wifi (Without Root)

 Top 10 Best wifi hacking apps to hack wifi^s.    Today, a smartphone without internet is like a decade ago featured phone which is mainly used to dial and receive the call. No one would even want such a phone today. The Internet is now a necessity for every mobile user. They can't live without the internet and unfortunately; if the Internet is not working due to some signal issues; they get frustrated and sometimes depressed too. Generally, we need to pay for the Internet subscription package to run mobile data on our smartphone. But what to do if I don't want to spend money on the Internet? The solution is to connect your mobile with WiFi. You can access the internet from there. Easy, right? NO, it's not easy until you know the password of WiFi. But what if you don't know. Two ways possible in this situation Either you ask for the password to the owner; he will provide you to use his internet through Wi-Fi You have to hack the Wi-Fi password of other's net

RenApp: The Ultimate File Renaming App

Download Here Are you tired of managing your tens of thousands of files like jpgs, pngs, or others and you want a way to manage them as quick as possible then RenApp is solution for all problem. RenApp lets you change names of many files of a particular type to a common name with added numbering. So no more time wasting in file management just four clicks and your files will be ordered. Beside that RenApp can clean your folders and subfolders from backup files of .bak or .*~ extension. Removing backup files in order to make space available manually is a tedious work and can take lots of time but why do it that we've got RenApp just locate the folder and click remove it'll remove them all from that folder and its subfolders.  Some of the features of RenApp are as:     Rename files to a common name.     Rename files of different extensions to a common name in one shot     Remove backup files from folder and subfolders. R   RenApp is free and Opensource, written in Python with QT

Bit Banging Your Database

This post will be about stealing data from a database one bit at a time. Most of the time pulling data from a database a bit at a time would not be ideal or desirable, but in certain cases it will work just fine. For instance when dealing with a blind time based sql injection. To bring anyone who is not aware of what a "blind time based" sql injection is up to speed - this is a condition where it is possible to inject into a sql statement that is executed by the database, but the application gives no indication about the result of the query. This is normally exploited by injecting boolean statements into a query and making the database pause for a determined about of time before returning a response. Think of it as playing a game "guess who" with the database. Now that we have the basic idea out of the way we can move onto how this is normally done and then onto the target of this post. Normally a sensitive item in the database is targeted, such as a username and pa

How To Download Torrents Files Directly To Your Android Device

uTorrent, one of the most popular BitTorrent clients, is now available for Android smartphones and tablets. Its use on mobile devices is very similar to its use in the PC. All you need is to search for torrents using the web browser on your mobile device, then uTorrent will download the files. Procedure: Download and install uTorrent  on your smartphone or tablet At the end of the installation click Open. Look for the torrents of your choice, several free and legal resources are available: http://www.legittorrents.info/ http://www.publicdomaintorrents.info/ http://www.legaltorrents.com/ In the list of results, click on the magnet shaped button that appears below the file you want to download A window showing where the file will be saved in the memory card will open. Click on Add Utorrent will start downloading the file Once the download is complete press the Play button to open the file Other softwares Torrent Downloader BitTorrent Vuze Related news Curso De Hacking Etico Gratis Libr

Data Types, Variables And Arrays In Java

CHAPTER 3 Data Types, Variables, and Arrays This chapter examines three of Java's most fundamental elements: data types, variables, and arrays. As with all modern programming languages, Java supports several types of data. You may use these types to declare variables and to create arrays. As you will see, Java's approach to these items is clean, efficient, and cohesive. Java Is a Strongly Typed Language It is important to state at the outset that Java is a strongly typed language. Indeed, part of Java's safety and robustness comes from this fact. Let's see what this means. First, every variable has a type, every expression has a type, and every type is strictly defined. Second, all assignments, whether explicit or via parameter passing in method calls, are checked for type compatibility. There are no automatic coercions or conversions of conflicting types as in some languages. The Java compiler checks all expressions and parameters to ensure that the types ar