Monday, January 16, 2006

See WMF exploit in actions

This vulnerability may have been exploited by blackhats for more number of years, it has catched the limelight lately... Lets see the exploit in action (flash video)
http://www.milw0rm.com/video/watch.php?id=5

Security Vids

http://www.defcon.org/html/links/dc-video.html
http://revision3.com/systm/
http://www.irongeek.com/i.php?page=security/hackingillustrated
http://fromtheshadows.tv/
http://www.infonomicon.org/video.php
http://www.hackingdefined.com/index.php/Demos
http://eks0.free.fr/whax-demos/
http://www.kisp.org/elohimus/tutorials.html
http://www.milw0rm.com/video/#

Wednesday, January 11, 2006

Video of Hacking Windows

http://www.demosondemand.com/clients/fiberlink/002/page/index_new.asp
The video shows how a person can take over a machine on the same network

1. Get victim's IP - (superscan)
2. Find which ports are open (superscan)
3. Using the precompiled vulnerability on remote machine to gain telnet
4. Share a folder on victim's machine and use it for file transfer
5. Running pwdump to get password hashes and then ultimately cracking with Cain
6. Getting the vpn's pcf file to possibly use the VPN
7. Copying Sub7 trojan and running it on victim's pc
and then... dreamz unlimited..