Thursday, 2024-04-25, 5:41 PM
Welcome Guest | RSS
Statistics

Total online: 1
Guests: 1
Users: 0
Site menu
Our Documentations
1* METASPLOIT
Blog Category
# Only for beginners [39]
This category contains some introductions and tutorials about UBUNTU and BACKTRACK for those who just start using LINUX.
# Computer Security [11]
In this category, you will find all courses about the Informatique Security
# LINUX [2]
EVERYTHING ABOUT LINUX - UBUNTU & BACKTRACK - (NEWS, VIDEOS, TUTORIALS, ... )
# BackTrack 5 Tutorials [6]
In this categorie, I will post all tutorials about BackTrack5 (Installation, Configuration, Update, Hacking...)
# TechnicDynamic Tutorials [12]
Technic Dynamic is a source of education focused in the following categories of technology: (Computer - Design - Gadgets - Networking - Security) Link : http://technicdynamic.com
# Vishnuvalentino Tutorials [2]
He is a computer security specialist, and also freelance website designer. Read more : http://vishnuvalentino.com/about/
# Hackers News [6]
All news about the hackers of the world ...
# Tools [18]
All Security Tools
MEMES PICTURES [0]
Entries archive
Shopping


Follow us
facebook
Main » 2012 » January » 27
Government websites hit by attacks


Two Government websites were forced offline for several hours overnight in co-ordinated cyber attacks.
The Department of Finance was shut from 11.20pm on Tuesday after a Twitter account, apparently linked to the Anonymous activist movement, urged associates and supporters to bombard the web page.
The Government has described the incident as a distributed denial of service, where huge volumes of internet traffic were directed to the websites.Services on the Department of Justice website were also interfered with.
Category: # Hackers News | Views: 734 | Added by: Administrator | Date: 2012-01-27 | Comments (0)


Hacking WPA 2 Key – Evil Twin (No Bruteforce)




In an ealier post, we’ve seen how to crack WPA-2 network keys using a dictionary.

 

While that technique works, it could take an awful long time, especially when brute forcing.

 

On this technique, named ‘Evil Twin’, we take a different perspective to the attack. Using a powerful long range wireless card (Alfa AWUS036NH), we clone the target network to confuse our victim. Then, we deauthenticate the victim from his own wireless network and wait until he connects to our access point – which looks exactly like his. :)

... Read more »

Category: # BackTrack 5 Tutorials | Views: 4118 | Added by: Administrator | Date: 2012-01-27 | Comments (2)

Visitors

Share This On:
Google Translator
Search
Login form
Our poll
Rate my site
Total of answers: 20
Clock & Calendar

«  January 2012  »
SuMoTuWeThFrSa
1234567
891011121314
15161718192021
22232425262728
293031