THE NEXT GENERATION OF COMPUTING

The ComputerManiac is for those who are Craze about computers.

HACKERS ARE HERE

ComputerManiac is connected to the ChennaiHackers community.

FIND EVERYTHING HERE

Feel free,This the platform for computer experts.

JOIN US

CONNECT WITH EXPERTS TO BECOME AN EXPERT

ASK US

FEEL FREE TO REACH US

Friday, 14 December 2012

Bypass Hidden SSID & MAC Address Filtering

The purpose of this blog post is to demonstrate why hidden SSID & MAC Address filtering should only be layers of wireless security used in conjunction with strong encryption such as WPA.Below are the steps an attacker could take to bypass a hidden SSID and MAC Address filtering to gain a foothold on your network and either instigate further attacks or use your internet connection.Tools Kismet The Attack1. I first use kismet to look...

Metasploit Payloads Tutorial

Metasploit Payloads - msfpayload This entry is really just a place for me to keep notes on working msfpayload details. I will expand on this post as i get more working examples. These payloads will be detected by AV, I will cover methods of avoiding AV detection in another post. In my examples 192.168.1.110 is the victim, and 192.168.1.112 is the attacker. Where I have not specified the port it will default to 4444. 1. For a listening shell on the target Create payload: ./msfpayload windows/shell_bind_tcp LPORT=2482 X >...

Sunday, 2 December 2012

OPH crack Live CD

Ophcrack  is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms. Features: Runs on Windows, Linux/Unix, Mac OS X, ... Cracks LM and NTLM h ashes. Free tables available for Windows XP and Vista. Brute-force module for simple passwords. Audit mode and CSV export. Real-time...

Monday, 19 November 2012

SSL Strip using Backtrack

SSL Strip is a tool that hijacks HTTP traffic on a network by replacing all the HTTPS/SSL links with HTTP ones. Once SSL Strip is setup all the victim traffic will be routed through the attacker and HTTP traffic will be redirected to the attacker machine. The attacker will be able to obtain all logon information by sniffing the HTTP plaintext protocol. How to: 1. Set up IP Forwarding echo 1 > /proc/sys/net/ipv4/ip_forward 2. Set up Port...

Wednesday, 14 November 2012

Pentest lab

Pentest lab vulnerable servers-applications list In this post I’m going to present some useful resources to learn about penetration testing and where to use exploitation tools and techniques in a safe and legal environment. This list contain a set of  deliberately insecure LiveCDs, Virtual machines and applicarions designed to be used as targets for enumeration, web exploitation, password cracking and reverse  engineering. If...

Tuesday, 13 November 2012

Comptia N+ Ebook

LESSON 1: Basic Network Theory Network Definitions Network Models Connectivity Network Addressing Signaling Concepts LESSON 2: Network Connectivity The Data Package Establishing a Connection Reliable Delivery Network Connectivity Noise Control Building Codes Connection Devices LESSON 3: Advanced Network Theory The OSI Model Ethernet Network Resources Token Ring/IEEE 802.5 FDDI Wireless Networking LESSON 4: Common Network Protocols Families...

Thursday, 8 November 2012

Kaspersky full version activator

Kaspersky activator DOWNLOAD HERE ...

Saturday, 3 November 2012

Havij Tutorial-Website Hacking

Havij Tutorial-Website Hacking   it is simple tut how to use havij to hack sites                                                                                                                      ...

Hack Website

Upload Shell and Deface a Website What we need: 1-A Shell (Will be provided) 2-A website vulnerable to SQLi 3-Image or File upload area on that Vulnerable website So firstly download the shell here. Download What is Shell ? A shell script is a script written for the shell, or command line interpreter, of an operating system. It is often considered a simple domain-specific programming language. Typical operations performed by...

Online hacking Tools

Online Tools Footprinting  Nmap Online IP Locator Traceroute WayBack Machine Whois Lookup Ascii Table Hash Cracking MD5 NTLM SHA1 Converters Binary Translator...

Ethical Hacking Syllabus overview

Certified Ethical Hacker Certified Ethical Hacker (312-50) CEH 1.CEH Ethics and Legal Issues12.CEH Web Application Vulnerabilities 2.CEH Footprinting 13.CEH Web Based Password Cracking Techniques 3.CEH Scanning 14.CEH SQL Injection 4.CEH Enumeration 15.CEH Hacking Wireless Networks 5.CEH System Hacking 16.CEH Virus and Worms 6.CEH Trojans and Backdoors 17.CEH Hacking Novell 7.CEH Sniffers 18.CEH Hacking Linux 8.CEH...