SWATing Samba
By:socrates
By:socrates
By:Josette
By:Grifter[the Hektik crew(tHc)]
§ What is Packet Sniffing?
By: Grifter[the Hektik crew(tHc)]
By adept [the Hektik crew (tHc)]
What PortScanning is
Querying TCP or UDP ports to see what responds. This is often done to identify listening services on a remote host, and for many hackers, this is the first step in gathering data about their target.
Since this is such a fundamental hacking skill, most of you are experienced with it. Feel free to bring up your favorite methods and tools. I know I will be leaving quite a few of my favorite tools out because... It's 2AM right now.
That's right folks, it's that time of the month once again, and we've got a VERY interesting line up for all of you. Most noteworthy of all would perhaps be Part I: CISC and Windows the Hardware Weak Link an article that demonstrates an ASP exploit and explains its inner workings. Unfortunately, we were unable to get the source code to the exploit in time for publication, but trust that it shall be made available in the next issue so do look out for that.
By: L33tdawg
By: madirish
Windows shares are probably one of the easiest ways to get unauthorized access to a remote computer. Most people enable shares for convenience, but Windows NT will, by default, share its primary hard drives for administrative purposes. Most shares can be controlled fairly well by users. The NT shares, however, cannot be shut down or changed, even by the Administrator. Windows shares operate on ports 137 and 139. The protocol uses a challenge response that reveals its most basic vulnerability.
By: unfrgvnme
Part Two in a series (of 3): Bloating Corporate, Shrinking Freedom.
Last time I blessed you all with a brief history lesson on Napster, AOL, and the freedoms we once experienced online (though online was certainly a different beast than it is today). This time i'll talk about how those freedoms are being methodically stripped away from us.
By: Knighty Knight (The Shadow Legacy Report)
I must apologize for the tardiness of this article. However it was necessary
to have the Shadow Legacy Legal team review our article to protect Hack
In the Box, ourselves, and various other parties form The MS Legal Staff.
If just any Pin Head, or Script Kiddie used information that we provided
to gain access to the tools that have the power to halt e-commerce and
other e-based transactions on the net.