Hacking 101: Footprinting using nothing but a web browser

| 0 comments

Welcome to this article which is to introduce the idea of foot-printing when it comes to hacking. What foot-printing really means is the act of information gathering and this can be either active or passive or even and combination of both. In order to determine the vulnerabilities of a given target you must first understand the target. To this end the information you can compile over the internet can yield tremendous results and this is known as passive foot-printing. Remember to keep good notes on the information that you are able to find. These notes will come in handy later …

Continue reading

Ways to protect your identity on the Internet

| 0 comments

At the time of this article I have an IP Address of 89.239.207.81 and I would ask you if you have any idea where my Internet Service Provider (ISP) resides? I live in the United States and at this moment my Internet connection is coming from Denmark. As demonstrated from the Google Map, I am clearly sitting  in Havdrup, Denmark however this is not true, well at least physically. My internet connection resides in Denmark why my physical location is within the United States. Here is the detailed information: IP Address: 89.239.207.81* City: Havdrup State: 20 Country: Denmark Latitude: 55.5333 …

Continue reading

Are you a Google Dork?

| 0 comments

Are you a Google Dork? Do you know what it means to be a Google Dork? The fact is Google is a wonderful search engine and it can very easy point you into the direction of your interest. However the darker side of Google, well depending upon how the search engine is used can often lead to information that you would never think would be indexed by Google. Before you begin thinking Google is evil here take note that the data is placed online by anyone with an Internet connection, therefore Google is doing nothing evil rather the search engine …

Continue reading

Website mirroring using GNU Wget

| 0 comments

GNU Wget is a free software package for retrieving files using HTTP, HTTPS, and FTP – the most widely-used Internet protocols. It is a non-interactive command-line tool, so it may easily be called from scripts, cron jobs, terminals without X-Windows support, etc. Why would you want to use this application? The fact is the black hats often use this to mirror a given site in order to review the content for anything that may be of value. This concept falls into the area of information gathering. So you may be asking your what possibly could be of value that a …

Continue reading

The four goals of cryptography

| 0 comments

Cryptography is the practice and study of techniques for secure communication in the presence of third parties. It is about constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation. Cryptography intersects the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. There are four goals of cryptography, these are: Privacy Authentication Integrity Non-repudiation

Encrypting file system in Windows

| 0 comments

Did you know that you can encrypt and decrypt files and folders within Windows without the need of any third party software? Encrypting File System (EFS) is a feature within New Technology File System (NTFS) where the individual who is currently logged into the operating system (OS) has the ability to perform encryption. If you encrypt a folder then any files that you move or copy into this folder also become encrypted and this all happens on the fly. The beauty of this is if you have a computer that is shared by multiple individuals this is a good way …

Continue reading