Quantcast
Channel: ctrlaltnarwhal » ctrlaltnarwhal
Browsing all 16 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

A Study On Russian Cyber Crime

As we all know a lot of the crime that happens on the internet originates in Russia. Mostly because of Russia’s rather relaxed approach to enforcing any laws on internet interactions. With the relative...

View Article



Image may be NSFW.
Clik here to view.

Attacking TrueCrypt Containers

TCHead decrypts and verifies the information in a TrueCrypt container’s header. Containers can range from files to copied system volumes from fully-encrypted hard drives. For this, you do of course...

View Article

Image may be NSFW.
Clik here to view.

Citadel: The Thoroughbred of Cyber Crime

In old times, a citadel was a fortress used as the last line of defense. For cyber criminals it is a powerful and state-of-the-art toolkit to both distribute malware and manage infected computers...

View Article

Image may be NSFW.
Clik here to view.

Setting a Mac into Monitor Mode

Due to overwhelming request I’m going to write a quick guide to setting you Mac into monitor mode for use with Cookie Cadger or Aircrack. In order to do this you will need a AirPort Extreme 802.11. The...

View Article

Image may be NSFW.
Clik here to view.

Kextstat_ASLR: Hiding Your Rootkits Mac OSX

I found a small utility for hiding your kernal rootkits in OSX Mountain Lion. Mountain Lion introduced kernel ASLR and the kextstat util output doesn’t support (yet?) this feature. The addresses are...

View Article


Image may be NSFW.
Clik here to view.

New Rootkit infects Linux Web servers

A previously unknown rootkit is infecting Linux web servers and injecting malicious code into web pages served by infected servers. The rootkit was discovered by a user of security mailing list Full...

View Article

Image may be NSFW.
Clik here to view.

The Art Of Con [Defcon 20]

View Article

Image may be NSFW.
Clik here to view.

Minecraft Installer Script for Xubuntu

I’m sorry it’s not really hacking related but I’ve created a script for installing Minecraft on Xubuntu. It can install both Minecraft and the Minecraft server. Sun Java if you don’t already have it....

View Article


Image may be NSFW.
Clik here to view.

Anonymous Email Accounts

A Tutorial on Anonymous Email Accounts Tomorrow, as the Senate Judiciary Committee considers reforming the decades-old federal email privacy law, the personal Inboxes and love lives of senior military...

View Article


Image may be NSFW.
Clik here to view.

Ruxcon: Homebrew Defensive Security

Interesting  sideshow from Ruxcon on building your own homebrew security, and implementing good security practices.

View Article

Image may be NSFW.
Clik here to view.

Ettercap Primer

Ettercap is certainly nothing new, and there is plenty of documentation around to see how to use it, but I was sitting here goofing around and decided to record my results. I am not advocating this...

View Article

Image may be NSFW.
Clik here to view.

Interesting comment I found on Reddit. Talking about a few really basic...

http://www.reddit.com/r/AskReddit/comments/1axevv/what_is_the_deepest_you_have_gone_in_the_internet/c91nhb6

View Article

Image may be NSFW.
Clik here to view.

Many Internet Connected Security Cameras are Open to Remote Exploit

Thousands of wireless IP cameras connected to the Internet have serious security weaknesses that allow attackers to hijack them and alter their firmware, according to two researchers from security firm...

View Article


Image may be NSFW.
Clik here to view.

McDonalds Uses Classical Music to Stop Anti-Social Behaviour

Though the technique has been used by Stockport council in the past, this is the first time classical music has been used in this way inside a local business. After rises in anti-social behaviour in...

View Article

Image may be NSFW.
Clik here to view.

Interesting comment I found on Reddit. Talking about a few really basic...

http://www.reddit.com/r/AskReddit/comments/1axevv/what_is_the_deepest_you_have_gone_in_the_internet/c91nhb6

View Article


Image may be NSFW.
Clik here to view.

Many Internet Connected Security Cameras are Open to Remote Exploit

Thousands of wireless IP cameras connected to the Internet have serious security weaknesses that allow attackers to hijack them and alter their firmware, according to two researchers from security firm...

View Article
Browsing all 16 articles
Browse latest View live




Latest Images